CVE Alert: CVE-2025-6042 – pebas – Lisfinity Core – Lisfinity Core plugin used for pebas® Lisfinity WordPress theme

CVE-2025-6042

HIGHNo exploitation known

The Lisfinity Core – Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.4.0. This is due to the plugin assigning the editor role by default. While limitations with respect to capabilities are put in place, use of the API is not restricted. This vulnerability can be leveraged together with CVE-2025-6038 to obtain admin privileges.

CVSS v3.1 (7.3)
Vendor
pebas
Product
Lisfinity Core – Lisfinity Core plugin used for pebas® Lisfinity WordPress theme
Versions
* lte 1.4.0
CWE
CWE-269, CWE-269 Improper Privilege Management
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Published
2025-10-15T05:23:48.703Z
Updated
2025-10-15T18:12:56.171Z

AI Summary Analysis

Risk verdict

High risk: unauthenticated privilege escalation is possible on the affected plugin, with remote exposure; exploitation is not reported as active, but the potential impact is significant.

Why this matters

Attackers can gain Editor privileges without authentication and may chain with another vulnerability to reach Admin privileges, enabling site manipulation, content impersonation, or backdoor installation. For organisations hosting public WordPress sites with classifieds features, the impact includes defacement, data exposure, and loss of trust.

Most likely attack path

An attacker browses a site that runs the vulnerable plugin and triggers unauthenticated interactions with its API endpoints. Because no user authentication is required and default Editor-like capabilities exist, the attacker can secure elevated privileges; if a separate vulnerability exists to reach Admin, traversal to full compromise is feasible. Preconditions include an internet‑accessible WordPress site with the plugin active and configured to assign Editor by default.

Who is most exposed

Publicly reachable WordPress sites using this plugin, especially those in classifieds or listing ecosystems, with weak access controls or minimal patching. Shared hosting or automated deployments without timely updates heighten exposure.

Detection ideas

  • Alerts on unexpected role changes to Editor/Admin from non-admin users
  • Unusual API calls or REST endpoint access tied to the plugin
  • Creation or modification of user accounts with elevated privileges
  • Anomalous content edits or admin actions by non-authenticated or untrusted sources
  • Patch/asset inventory showing plugin version older than the patched release

Mitigation and prioritisation

  • Apply the latest plugin update (beyond 1.4.0) or remove/disable the plugin if not essential
  • Enforce principle of least privilege for all accounts and restrict plugin API access
  • Implement web application firewall rules to block unauthenticated privilege-enabling requests
  • Audit logs for role changes, admin activity, and new accounts; configure alerts
  • Schedule patching during maintenance windows; document change control as a high-priority update
  • If exploitation indicators emerge or KEV/EPSS signals rise, treat as priority 1.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features