Cyber Posture

CVE-2025-12963

Critical

Published: 12 December 2025

Published
12 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The LazyTasks – Project & Task Management with Collaboration, Kanban and Gantt Chart plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.2.29. This is due to the plugin not properly…

more

validating a user's identity via the 'wp-json/lazytasks/api/v1/user/role/edit/' REST API endpoint prior to updating their details like email address. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. It is also possible for attackers to abuse this endpoint to grant users with access to additional roles within the plugin

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations on the vulnerable REST API endpoint to prevent unauthenticated privilege escalation via unauthorized user email and role updates.

prevent

Requires timely identification, reporting, and patching of the specific authorization flaw in the LazyTasks WordPress plugin to eliminate the vulnerability.

prevent

Manages account identifiers, attributes like email addresses, and plugin role memberships with identity validation to mitigate unauthorized modifications.

Security SummaryAI

CVE-2025-12963 is a critical privilege escalation vulnerability affecting the LazyTasks – Project & Task Management with Collaboration, Kanban and Gantt Chart plugin for WordPress, in all versions up to and including 1.2.29. The issue stems from the plugin's failure to properly validate a user's identity via the 'wp-json/lazytasks/api/v1/user/role/edit/' REST API endpoint before updating user details, such as email addresses. This flaw, classified under CWE-862 (Missing Authorization), has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2025-12-12.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required. By abusing the vulnerable endpoint, they can arbitrarily change any user's email address, including those of administrators, and then leverage standard WordPress password reset functionality to take over the account. Additionally, attackers can grant targeted users access to additional roles within the plugin, potentially escalating their own privileges or those of other accounts.

Mitigation details are available in related advisories, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/c6998185-0f9b-48ab-9dca-05adf5ae603a?source=cve and the plugin's WordPress.org page at https://wordpress.org/plugins/lazytasks-project-task-management/. Security practitioners should review these sources for patch availability, update recommendations, and workaround guidance.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
Why these techniques?

The vulnerability allows unauthenticated exploitation of a public-facing WordPress REST API endpoint (T1190) to manipulate user accounts by changing emails/roles for account takeover and privilege escalation (T1068, T1098).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References