CVE Alert: CVE-2025-5483 – niaj – Connector Wizard (formerly LC Wizard)
CVE-2025-5483
The LC Wizard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check in the ghl-wizard/inc/wp_user.php file in versions 1.2.10 to 1.3.0. This makes it possible for unauthenticated attackers to create new user accounts with the administrator role when the PRO functionality is enabled.
AI Summary Analysis
Risk verdict
High risk: unauthenticated privilege escalation in the vulnerable WordPress plugin could enable remote creation of administrator accounts, risking full site takeover.
Why this matters
Remote, no-auth exploitation means quick compromise for any exposed site featuring the plugin with PRO functionality enabled. Once admin access is obtained, attackers can install backdoors, exfiltrate data, modify or disable security controls, or disrupt availability.
Most likely attack path
- Preconditions: plugin is deployed with PRO features enabled; vulnerable code path exposed to unauthenticated requests.
- Attack flow: attacker calls the affected endpoint to create an admin account without credentials, bypassing authorization checks.
- Post-exploit: attacker gains full admin rights and can pivot to persistence, data access, and systemic compromise across the site.
Who is most exposed
Sites running the affected plugin on public WordPress instances, especially with PRO features enabled and weak admin hygiene or exposed admin endpoints. Providers or hosts with many WordPress sites may see broader impact if misconfigured.
Detection ideas
- Sudden creation of new administrator accounts without corresponding user activity.
- Admin-level user changes from unusual IPs or at unusual times.
- Logs showing unauthorized calls to wp_user-related endpoints or plugin files.
- File changes or plugin configuration updates coinciding with admin account creation.
- Unexplained increases in admin privileges or disabled security features.
Mitigation and prioritisation
- Apply the patched version (or upgrade beyond 1.3.0) as soon as available; temporarily disable PRO functionality if feasible.
- Enforce least privilege: restrict admin creation to trusted paths, require authentication for privileged actions, and review admin accounts.
- Implement compensating controls: web application firewall rules targeting plugin endpoints, IP allowlists for admin functions, and enhanced logging of user-creation events.
- Change-management: test patch in staging, plan a rapid rollout, and communicate to site owners. If KEV/SSVC indicators emerge, escalate to priority 1.
Support Our Work
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.
