Add Unauthenticated privesc for WP User Registration & Membership plugin (CVE-2025-2563) #20159
+456
−6
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Hello Metasploit Team,
This change adds a new module,
exploit/multi/http/wp_user_registration_membership_escalation.rb
, which targets CVE-2025-2563 in the WordPress User Registration & Membership plugin (Free < 4.1.2, Pro < 5.1.2). When the Membership Addon is enabled, the plugin fails to enforce role restrictions on its unauthenticated AJAX endpoint, allowing anyone to register a new account and assign it theadministrator
role.Verification
Start
msfconsole
use exploit/multi/http/wp_user_registration_membership_escalation
Set the required options:
RHOSTS
to the target IP or hostnameTARGETURI
to the WordPress base path (default/
)WP_USER
,WP_PASS
,WP_EMAIL
for the new admin accountCheck for vulnerability:
check
Exploit the target:
exploit
You should see output indicating an administrator user was created:
Verify:
/wp-login.php
or /login//wp-admin/
and see the Dashboard)