CVE-2025-12641
📋 TL;DR
This vulnerability allows unauthenticated attackers to demote WordPress administrators to low-privilege roles in the Awesome Support plugin. Attackers can exploit missing capability checks and nonce reuse to modify user permissions without authentication. All WordPress sites using Awesome Support plugin versions up to 6.3.6 are affected.
💻 Affected Systems
- Awesome Support - WordPress HelpDesk & Support Plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete site takeover through privilege escalation, allowing attackers to demote all administrators and take control of the WordPress installation.
Likely Case
Administrator accounts being demoted to subscriber or other low-privilege roles, disrupting site management and potentially enabling further attacks.
If Mitigated
No impact if proper access controls and nonce validation are implemented, or if the vulnerable endpoint is blocked.
🎯 Exploit Status
Exploitation requires extracting a valid nonce from public registration pages and crafting a request with user-controlled parameters.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.3.7 or later
Vendor Advisory: https://wordpress.org/plugins/awesome-support/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Awesome Support plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.3.7+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable User Registration
allPrevent access to registration pages that provide the required nonce
Navigate to WordPress Settings → General → Membership → Uncheck 'Anyone can register'
Block Vulnerable Endpoint via .htaccess
linuxBlock access to the vulnerable action endpoint
RewriteCond %{QUERY_STRING} wpas-do=mr_activate_user [NC]
RewriteRule ^ - [F,L]
🧯 If You Can't Patch
- Temporarily disable the Awesome Support plugin until patching is possible
- Implement web application firewall rules to block requests containing 'wpas-do=mr_activate_user' parameter
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin → Plugins → Awesome Support. If version is 6.3.6 or lower, the site is vulnerable.
Check Version:
wp plugin get awesome-support --field=version (if WP-CLI installed)
Verify Fix Applied:
Verify plugin version is 6.3.7 or higher. Test that nonces from registration pages cannot be reused for privileged actions.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing 'wpas-do=mr_activate_user' parameter
- User role changes from administrator to lower privileges
- Failed authentication attempts followed by role modification requests
Network Indicators:
- POST requests to wp-admin/admin-ajax.php with wpas-do parameter
- Unusual traffic to registration pages from non-user IPs
SIEM Query:
source="web_logs" AND (uri_path="*/admin-ajax.php" AND query_string="*wpas-do=mr_activate_user*")
🔗 References
- https://plugins.trac.wordpress.org/browser/awesome-support/tags/6.3.5/includes/functions-actions.php#L36
- https://plugins.trac.wordpress.org/browser/awesome-support/tags/6.3.5/includes/functions-actions.php#L66
- https://plugins.trac.wordpress.org/browser/awesome-support/tags/6.3.5/includes/functions-user.php#L1686
- https://plugins.trac.wordpress.org/browser/awesome-support/tags/6.3.5/themes/default/registration.php#L183
- https://plugins.trac.wordpress.org/changeset/3435609/awesome-support/trunk/includes/functions-user.php?contextall=1
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a5a8e4ca-c16b-4e9d-8ad2-5a671fdbc49a?source=cve