CVE-2025-12641

6.5 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to demote WordPress administrators to low-privilege roles in the Awesome Support plugin. Attackers can exploit missing capability checks and nonce reuse to modify user permissions without authentication. All WordPress sites using Awesome Support plugin versions up to 6.3.6 are affected.

💻 Affected Systems

Products:
  • Awesome Support - WordPress HelpDesk & Support Plugin
Versions: All versions up to and including 6.3.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Awesome Support plugin enabled and registration/submit ticket pages accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover through privilege escalation, allowing attackers to demote all administrators and take control of the WordPress installation.

🟠

Likely Case

Administrator accounts being demoted to subscriber or other low-privilege roles, disrupting site management and potentially enabling further attacks.

🟢

If Mitigated

No impact if proper access controls and nonce validation are implemented, or if the vulnerable endpoint is blocked.

🌐 Internet-Facing: HIGH - The exploit requires only public access to registration pages and can be performed by unauthenticated attackers.
🏢 Internal Only: LOW - The vulnerability primarily affects internet-facing WordPress installations with the plugin enabled.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires extracting a valid nonce from public registration pages and crafting a request with user-controlled parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.7 or later

Vendor Advisory: https://wordpress.org/plugins/awesome-support/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Awesome Support plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 6.3.7+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable User Registration

all

Prevent access to registration pages that provide the required nonce

Navigate to WordPress Settings → General → Membership → Uncheck 'Anyone can register'

Block Vulnerable Endpoint via .htaccess

linux

Block access to the vulnerable action endpoint

RewriteCond %{QUERY_STRING} wpas-do=mr_activate_user [NC]
RewriteRule ^ - [F,L]

🧯 If You Can't Patch

  • Temporarily disable the Awesome Support plugin until patching is possible
  • Implement web application firewall rules to block requests containing 'wpas-do=mr_activate_user' parameter

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin → Plugins → Awesome Support. If version is 6.3.6 or lower, the site is vulnerable.

Check Version:

wp plugin get awesome-support --field=version (if WP-CLI installed)

Verify Fix Applied:

Verify plugin version is 6.3.7 or higher. Test that nonces from registration pages cannot be reused for privileged actions.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'wpas-do=mr_activate_user' parameter
  • User role changes from administrator to lower privileges
  • Failed authentication attempts followed by role modification requests

Network Indicators:

  • POST requests to wp-admin/admin-ajax.php with wpas-do parameter
  • Unusual traffic to registration pages from non-user IPs

SIEM Query:

source="web_logs" AND (uri_path="*/admin-ajax.php" AND query_string="*wpas-do=mr_activate_user*")

🔗 References

📤 Share & Export