CVE-2025-12882
Awaiting Analysis Awaiting Analysis - Queue
Privilege Escalation in Clasifico Listing Plugin via Role Parameter

Publication date: 2026-02-19

Last updated on: 2026-02-19

Assigner: Wordfence

Description
The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_role' parameter. This makes it possible for unauthenticated attackers to gain elevated privileges by registering an account with the administrator role.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-19
Last Modified
2026-02-19
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
clasifico listing_plugin to 2.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Clasifico Listing plugin for WordPress has a privilege escalation vulnerability in versions up to and including 2.0. This occurs because the plugin allows users who are registering new accounts to specify their own user role via the 'listing_user_role' parameter.

As a result, an unauthenticated attacker can exploit this by registering an account and assigning themselves the administrator role, thereby gaining elevated privileges they should not have.


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows an attacker to gain administrator-level access without authentication.

  • The attacker can fully control the WordPress site, including modifying content, installing malicious plugins, or stealing sensitive data.
  • It can lead to complete compromise of the website's integrity, confidentiality, and availability.
  • The high CVSS score of 9.8 reflects the critical nature of this vulnerability.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart