The CubeWP – All-in-One Dynamic Content Framework plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.23. This is due to the plugin allowing a user to update arbitrary user meta through the update_user_meta() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.
References
Configurations
History
10 Jul 2025, 00:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:cubewp:cubewp:*:*:*:*:*:wordpress:*:* | |
First Time |
Cubewp
Cubewp cubewp |
|
CWE | NVD-CWE-noinfo | |
References | () https://plugins.trac.wordpress.org/browser/cubewp-framework/tags/1.1.23/cube/classes/class-cubewp-rest-api.php#L691 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3306925/cubewp-framework#file2 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/430b7e72-72b8-4cf8-99f4-ee1d1d4b4f24?source=cve - Third Party Advisory |
12 Jun 2025, 16:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Jun 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-11 10:15
Updated : 2025-07-10 00:28
NVD link : CVE-2025-4315
Mitre link : CVE-2025-4315
CVE.ORG link : CVE-2025-4315
JSON object : View
Products Affected
cubewp
- cubewp
CWE