CVE-2025-13538

9.8 CRITICAL

📋 TL;DR

The FindAll Listing plugin for WordPress has a privilege escalation vulnerability that allows unauthenticated attackers to register as administrators when the FindAll Membership plugin is also active. This affects all WordPress sites using FindAll Listing plugin versions up to 1.0.5 with the FindAll Membership plugin enabled. Attackers can gain full administrative control of vulnerable WordPress installations.

💻 Affected Systems

Products:
  • FindAll Listing WordPress Plugin
Versions: All versions up to and including 1.0.5
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability only exploitable when both FindAll Listing plugin AND FindAll Membership plugin are activated. WordPress sites without FindAll Membership plugin are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with administrative access, allowing data theft, defacement, malware injection, and further network compromise.

🟠

Likely Case

Attackers gain administrative access to WordPress dashboard, enabling content manipulation, plugin/themes installation, and user account creation.

🟢

If Mitigated

Limited impact if registration is disabled or proper role validation is implemented at the web application firewall level.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted registration requests with administrator role parameter. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.0.5

Vendor Advisory: https://themeforest.net/item/findall-business-directory-theme/24415962

Restart Required: No

Instructions:

1. Update FindAll Listing plugin to latest version (above 1.0.5). 2. Verify FindAll Membership plugin is also updated if available. 3. Test user registration functionality.

🔧 Temporary Workarounds

Disable User Registration

all

Temporarily disable user registration in WordPress settings to prevent exploitation

WordPress Admin Dashboard → Settings → General → Uncheck 'Anyone can register'

Deactivate FindAll Membership Plugin

all

Remove the required component for exploitation

WordPress Admin Dashboard → Plugins → Deactivate FindAll Membership

🧯 If You Can't Patch

  • Implement web application firewall rules to block registration requests containing role parameters
  • Monitor user registration logs for suspicious administrator role assignments

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin dashboard for FindAll Listing plugin version. If version is 1.0.5 or lower AND FindAll Membership plugin is active, the system is vulnerable.

Check Version:

WordPress Admin Dashboard → Plugins → FindAll Listing → View version

Verify Fix Applied:

After updating, verify plugin version is above 1.0.5. Test user registration with role parameter to confirm it's rejected.

📡 Detection & Monitoring

Log Indicators:

  • User registration logs showing role=administrator parameter
  • New administrator accounts created via registration form
  • Failed registration attempts with role parameters

Network Indicators:

  • HTTP POST requests to registration endpoints with role parameters
  • Unusual registration traffic from single IPs

SIEM Query:

source="wordpress" AND ("register" OR "registration") AND ("role=administrator" OR "administrator")

🔗 References

📤 Share & Export