CVE-2025-0180

9.8 CRITICAL

📋 TL;DR

The WP Foodbakery WordPress plugin has a privilege escalation vulnerability that allows unauthenticated attackers to register as administrators. This affects all versions up to and including 3.3. Any WordPress site using this vulnerable plugin is at risk.

💻 Affected Systems

Products:
  • WP Foodbakery WordPress Plugin
Versions: All versions up to and including 3.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and active. User registration must be enabled on the WordPress site.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, install backdoors, steal data, deface the site, or use it for further attacks.

🟠

Likely Case

Attackers create administrator accounts to gain persistent access, potentially leading to data theft, malware installation, or site compromise.

🟢

If Mitigated

With proper controls like WAF rules and monitoring, attacks may be blocked or detected before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward and requires minimal technical skill. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.4 or later

Vendor Advisory: https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331

Restart Required: No

Instructions:

1. Update the WP Foodbakery plugin to version 3.4 or later via WordPress admin panel. 2. Verify the update completed successfully. 3. Test user registration functionality.

🔧 Temporary Workarounds

Disable User Registration

all

Temporarily disable user registration in WordPress settings to prevent exploitation.

Web Application Firewall Rule

all

Add WAF rules to block suspicious user registration requests targeting the vulnerable endpoint.

🧯 If You Can't Patch

  • Immediately disable the WP Foodbakery plugin if patching is not possible.
  • Implement strict monitoring for unauthorized administrator account creation and suspicious user registration activity.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin panel under Plugins. If version is 3.3 or lower, the site is vulnerable.

Check Version:

wp plugin list --name=foodbakery --field=version

Verify Fix Applied:

After updating, confirm the plugin version shows 3.4 or higher in the WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple user registration attempts from single IP
  • User registration with administrator role or unusual meta data
  • New administrator accounts created via registration form

Network Indicators:

  • HTTP POST requests to user registration endpoints with modified role parameters
  • Unusual traffic patterns to registration pages

SIEM Query:

source="wordpress.log" AND (event="user_registration" AND role="administrator") OR (event="user_created" AND user_role="administrator")

🔗 References

📤 Share & Export