The WPFront User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.1. This is due to missing or incorrect nonce validation on the whitelist_options() function. This makes it possible for unauthenticated attackers to update the default role option that can be leveraged for privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This is only exploitable on multisite instances.
Metrics
Affected Vendors & Products
References
History
Tue, 08 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Apr 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WPFront User Role Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.1. This is due to missing or incorrect nonce validation on the whitelist_options() function. This makes it possible for unauthenticated attackers to update the default role option that can be leveraged for privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This is only exploitable on multisite instances. | |
Title | WPFront User Role Editor <= 4.2.1 - Cross-Site Request Forgery to Privilege Escalation via whitelist_options Function | |
Weaknesses | CWE-352 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-04-08T08:22:09.698Z
Updated: 2025-04-08T13:40:51.320Z
Reserved: 2025-03-31T22:25:31.869Z
Link: CVE-2025-3064

Updated: 2025-04-08T13:40:43.563Z

Status : Awaiting Analysis
Published: 2025-04-08T09:15:28.140
Modified: 2025-04-08T18:13:53.347
Link: CVE-2025-3064

No data.