CVE Alert: CVE-2025-5117

Vulnerability Summary: CVE-2025-5117
The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author‐level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form.
Affected Endpoints:
No affected endpoints listed.
Published Date:
5/27/2025, 12:15:36 PM
🔥 CVSS Score:
Exploit Status:
Not ExploitedEPS Score: 0.00046 | Ranking EPS: 0.13728
References:
- https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/admin/pages/payment-inc/paypal-submit.php#L128
- https://plugins.trac.wordpress.org/browser/property/tags/1.0.6/property.php#L1964
- https://plugins.trac.wordpress.org/changeset/3299714/
- https://wordpress.org/plugins/property/#developers
- https://www.wordfence.com/threat-intel/vulnerabilities/id/df48f7f9-7bc9-4f9b-b9b5-6bfb86309030?source=cve
Recommended Action:
No proposed action available. Please refer to vendor documentation for updates.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.