Cyber Posture

CVE-2025-2232

Critical

Published: 14 March 2025

Published
14 March 2025
Modified
25 March 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 18.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may create an account to maintain access to victim systems.

Security Summary

CVE-2025-2232 is an authentication bypass vulnerability in the Realteo - Real Estate Plugin by Purethemes for WordPress, which is used by the Findeo Theme. It affects all versions up to and including 1.2.8 and stems from insufficient role restrictions in the 'do_register_user' function. This flaw enables unauthenticated attackers to register a new account with Administrator privileges. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-269 (Improper Privilege Management).

Unauthenticated attackers can exploit this issue remotely over the network with low complexity and no user interaction or privileges required. By invoking the vulnerable registration function, they can create an Administrator account, achieving high-impact confidentiality, integrity, and availability effects, such as full site takeover, data exfiltration, content manipulation, and potential lateral movement within the environment.

Advisories and patch information are detailed in the Findeo changelog at https://docs.purethemes.net/findeo/knowledge-base/changelog-findeo/ and the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/abe73ecd-1325-4d6d-8545-d27f6116ca43?source=cve. Security practitioners should consult these sources for mitigation steps, including updating to a patched version where available.

Details

CWE(s)
CWE-269NVD-CWE-noinfo

Affected Products

purethemes
realteo
≤ 1.2.9

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1136 Create Account Persistence
Adversaries may create an account to maintain access to victim systems.
Why these techniques?

The vulnerability is an auth bypass in a public-facing WordPress plugin allowing remote unauthenticated creation of an administrator account, directly mapping to exploitation of public-facing apps (T1190) and creation of a privileged account (T1136).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References