Cyber Posture

CVE-2025-2266

Critical

Published: 29 March 2025

Published
29 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0068 71.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-2266 is a high-severity vulnerability in the Checkout Mestres do WP for WooCommerce plugin for WordPress, affecting versions 8.6.5 through 8.7.5. It stems from a missing capability check in the cwmpUpdateOptions() function, enabling unauthorized modification of data that results in privilege escalation. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-862 (Missing Authorization), published on 2025-03-29.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction. By calling the vulnerable function, they can update arbitrary WordPress site options, such as changing the default role for new user registrations to administrator and enabling registration. This allows attackers to self-register with administrative privileges, achieving full site compromise including high confidentiality, integrity, and availability impacts.

Advisories and related resources, including Wordfence's threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/9834fd5b-8445-4c6f-95f9-f0df785c65f8?source=cve, the plugin's WordPress.org page at https://wordpress.org/plugins/checkout-mestres-wp/, and vulnerable code at https://plugins.trac.wordpress.org/browser/checkout-mestres-wp/trunk/backend/core/base/ajax.php#L31, offer details on detection and remediation for affected sites.

Details

CWE(s)
CWE-862

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability allows remote unauthenticated exploitation of a public-facing WordPress plugin (T1190) resulting in privilege escalation via unauthorized option modification to grant admin access (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References