Cyber Posture

CVE-2025-11533

Critical

Published: 11 October 2025

Published
11 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 39.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-11533 is a privilege escalation vulnerability in the WP Freeio plugin for WordPress, affecting all versions up to and including 1.2.21. The flaw arises in the process_register() function, which does not restrict the user roles that can be assigned during registration. This allows attackers to specify arbitrary roles, such as 'administrator', upon creating a new account.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and association with CWE-269 (Improper Privilege Management). By supplying the 'administrator' role during the registration process, they gain full administrative access to the site, enabling actions such as data exfiltration, modification, or execution of arbitrary code.

Advisories from Wordfence provide further details on the vulnerability at https://www.wordfence.com/threat-intel/vulnerabilities/id/0db85f84-04e9-42eb-a16b-96554fbfd186?source=cve, while the plugin's ThemeForest page is available at https://themeforest.net/item/freeio-freelance-marketplace-wordpress-theme/42045416. Security practitioners should consult these sources for patch availability and mitigation guidance, such as updating to a fixed version.

Details

CWE(s)
CWE-269

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability enables unauthenticated remote exploitation of a public-facing WordPress plugin (T1190) to register an administrator account, achieving privilege escalation (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References