CVE-2026-0912
Privilege Escalation in Toret Manager Plugin via Missing Capability Check
Publication date: 2026-02-19
Last updated on: 2026-04-08
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| toret_manager | toret_manager | to 1.2.7 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can lead to privilege escalation where an attacker with low-level access can gain full administrative control over the WordPress site.
With administrative access, attackers can modify site settings, install malicious plugins or themes, steal sensitive data, or disrupt site operations.
The impact includes potential data breaches, loss of site integrity, and unauthorized control over the website.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
Can you explain this vulnerability to me?
The Toret Manager plugin for WordPress has a vulnerability due to missing capability checks in the 'trman_save_option' and 'trman_save_option_items' functions in all versions up to and including 1.2.7.
This flaw allows authenticated users with Subscriber-level access or higher to modify arbitrary options on the WordPress site.
Attackers can exploit this to change the default user role for new registrations to administrator and enable user registration, thereby gaining administrative access to the site.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability exists in all versions of the Toret Manager plugin for WordPress up to and including version 1.2.7. To mitigate this vulnerability, you should immediately update the Toret Manager plugin to a version later than 1.2.7 where this issue is fixed.
Additionally, consider restricting user roles and permissions to prevent Subscriber-level users from making unauthorized changes, and disable user registration if it is not required to reduce the risk of attackers gaining administrative access.