CVE-2025-8572
Unknown Unknown - Not Provided
Privilege Escalation in Truelysell Core Plugin ≀ v

Publication date: 2026-02-14

Last updated on: 2026-02-14

Assigner: Wordfence

Description
The Truelysell Core plugin for WordPress is vulnerable to privilege escalation in versions less than, or equal to, 1.8.7. This is due to insufficient validation of the user_role parameter during user registration. This makes it possible for unauthenticated attackers to create accounts with elevated privileges, including administrator access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-14
Last Modified
2026-02-14
Generated
2026-05-07
AI Q&A
2026-02-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
truelysell core to 1.8.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Truelysell Core plugin for WordPress has a vulnerability in versions up to 1.8.7 that allows privilege escalation. This happens because the plugin does not properly validate the user_role parameter during user registration.

As a result, unauthenticated attackers can exploit this flaw to create accounts with elevated privileges, including administrator access.


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows attackers without authentication to gain administrator-level access to a WordPress site using the Truelysell Core plugin.

  • Attackers can create accounts with elevated privileges.
  • They can potentially take full control over the website.
  • This can lead to data breaches, site defacement, or further exploitation.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart