CVE-2025-10706

8.8 HIGH

📋 TL;DR

The Classified Pro WordPress theme allows authenticated users with subscriber-level access or higher to install arbitrary plugins due to a missing capability check. This vulnerability could lead to remote code execution by installing malicious plugins. Sites using Classified Pro theme version 1.0.14 or earlier with the CubeWP Framework plugin are affected.

💻 Affected Systems

Products:
  • Classified Pro WordPress Theme
Versions: All versions up to and including 1.0.14
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the CubeWP Framework plugin to be installed for the vulnerable nonce to be present.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of the WordPress site through remote code execution, potentially compromising the entire server and exfiltrating sensitive data.

🟠

Likely Case

Attackers install malicious plugins to establish backdoors, deface websites, or deploy cryptocurrency miners.

🟢

If Mitigated

Attackers can only install plugins but cannot execute them due to proper security controls, limiting impact to plugin management disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access (subscriber or higher) and knowledge of the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.15 or later

Vendor Advisory: https://themeforest.net/item/classifiedpro-recommerce-classified-wordpress-theme/44528010

Restart Required: No

Instructions:

1. Update Classified Pro theme to version 1.0.15 or later via WordPress admin panel. 2. Verify CubeWP Framework plugin is also updated if available. 3. Clear WordPress cache after update.

🔧 Temporary Workarounds

Remove vulnerable theme

all

Temporarily switch to default WordPress theme until patch is applied

wp theme activate twentytwentyfour

Restrict user capabilities

all

Remove plugin installation capabilities from subscriber and other non-admin roles

wp role reset subscriber
wp cap remove subscriber install_plugins

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to the vulnerable 'cwp_addons_update_plugin_cb' function
  • Monitor for unauthorized plugin installations and review installed plugins regularly

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for Classified Pro theme version. If version is 1.0.14 or earlier and CubeWP Framework plugin is installed, the system is vulnerable.

Check Version:

wp theme list --name=classified-pro --field=version

Verify Fix Applied:

Verify theme version is 1.0.15 or later in WordPress admin panel under Appearance > Themes.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to admin-ajax.php with action 'cwp_addons_update_plugin_cb'
  • Unexpected plugin installation events in WordPress logs
  • New plugin directories created without admin action

Network Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with plugin installation parameters from non-admin users

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "cwp_addons_update_plugin_cb"

🔗 References

📤 Share & Export