The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author‐level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form.
Metrics
Affected Vendors & Products
References
History
Tue, 27 May 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 27 May 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author‐level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form. | |
Title | Property 1.0.5 - 1.0.6 - Missing Authorization to Authenticated (Author+) Privilege Escalation via property_package_user_role Metadata in PayPal Registration | |
Weaknesses | CWE-862 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-27T11:14:26.964Z
Updated: 2025-05-27T13:05:07.985Z
Reserved: 2025-05-23T10:58:13.501Z
Link: CVE-2025-5117

Updated: 2025-05-27T13:05:01.385Z

Status : Awaiting Analysis
Published: 2025-05-27T12:15:36.167
Modified: 2025-05-28T15:01:30.720
Link: CVE-2025-5117

No data.