The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Jun 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 05 Jun 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | |
Title | HyperComments <= 1.2.2 - Unauthenticated (Subscriber+) Arbitrary Options Update | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-05T11:15:05.674Z
Updated: 2025-06-05T14:29:15.185Z
Reserved: 2025-06-04T21:39:51.682Z
Link: CVE-2025-5701

Updated: 2025-06-05T14:28:54.156Z

Status : Awaiting Analysis
Published: 2025-06-05T12:15:24.233
Modified: 2025-06-05T20:12:23.777
Link: CVE-2025-5701

No data.