CVE-2025-0177

9.8 CRITICAL

📋 TL;DR

The Javo Core WordPress plugin allows unauthenticated attackers to create accounts with administrator privileges due to improper role assignment during registration. This affects all WordPress sites using Javo Core plugin versions up to 3.0.0.080. Attackers can gain full control of vulnerable WordPress installations.

💻 Affected Systems

Products:
  • Javo Core WordPress Plugin
Versions: All versions up to and including 3.0.0.080
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user registration to be enabled on WordPress site. Affects any WordPress installation using vulnerable Javo Core plugin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of WordPress site with attacker gaining administrator access, installing backdoors, defacing site, stealing data, and using site for further attacks.

🟠

Likely Case

Attackers create administrator accounts to take control of site, install malware, redirect visitors, or use site resources for malicious purposes.

🟢

If Mitigated

If registration is disabled or properly monitored, impact is limited to existing user accounts only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web access to registration page. No special tools or skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 3.0.0.080

Vendor Advisory: https://themeforest.net/item/javo-directory-wordpress-theme/8390513#item-description__update-history

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Javo Core plugin. 4. Update to latest version. 5. Verify update completed successfully.

🔧 Temporary Workarounds

Disable User Registration

all

Turn off user registration in WordPress settings to prevent account creation

Remove Javo Core Plugin

all

Temporarily deactivate and remove vulnerable plugin until patched

🧯 If You Can't Patch

  • Disable user registration in WordPress settings immediately
  • Implement web application firewall rules to block registration requests
  • Monitor user creation logs for suspicious administrator account creation

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Javo Core version. If version is 3.0.0.080 or lower, system is vulnerable.

Check Version:

WordPress admin panel: Plugins > Javo Core (view details)

Verify Fix Applied:

Verify Javo Core plugin version is higher than 3.0.0.080 in WordPress plugins page.

📡 Detection & Monitoring

Log Indicators:

  • New user registrations with administrator role
  • Multiple registration attempts from same IP
  • User creation outside normal business hours

Network Indicators:

  • POST requests to /wp-login.php?action=register with role parameters
  • Unusual traffic to registration endpoints

SIEM Query:

source="wordpress" (event="user_registered" AND user_role="administrator")

🔗 References

📤 Share & Export