CVE-2025-52804

7.5 HIGH

📋 TL;DR

This CVE describes a missing authorization vulnerability in the uxper Nuss WordPress theme that allows attackers to access functionality not properly constrained by access control lists. Attackers can perform actions intended only for authorized users. This affects all WordPress sites using Nuss theme versions up to and including 1.3.3.

💻 Affected Systems

Products:
  • uxper Nuss WordPress Theme
Versions: All versions up to and including 1.3.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the Nuss theme active. The vulnerability exists in the theme's access control implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify site content, change settings, access sensitive data, or perform administrative actions leading to complete site compromise.

🟠

Likely Case

Unauthorized users can access privileged functionality such as modifying theme settings, changing site appearance, or accessing restricted content.

🟢

If Mitigated

With proper access controls, only authorized users can access administrative functions, limiting impact to intended functionality.

🌐 Internet-Facing: HIGH - WordPress themes are internet-facing by design, and this vulnerability allows unauthenticated or low-privileged access to protected functionality.
🏢 Internal Only: MEDIUM - Internal users could exploit this to escalate privileges or access unauthorized functionality within the WordPress admin interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves broken access control, which typically requires minimal technical skill to exploit once the vulnerable endpoints are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.3.3

Vendor Advisory: https://patchstack.com/database/wordpress/theme/nuss/vulnerability/wordpress-nuss-1-3-3-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Nuss theme updates. 4. Update to the latest version. 5. Alternatively, replace with a different theme if updates are unavailable.

🔧 Temporary Workarounds

Disable Nuss Theme

all

Switch to a different WordPress theme that doesn't have this vulnerability

wp theme activate twentytwentyfour
wp theme delete nuss

Restrict Access via Web Application Firewall

all

Block access to vulnerable theme endpoints using WAF rules

🧯 If You Can't Patch

  • Switch to a different WordPress theme immediately
  • Implement strict network access controls to limit who can access the WordPress admin interface

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Appearance > Themes for Nuss theme version. If version is 1.3.3 or lower, the system is vulnerable.

Check Version:

wp theme list --name=nuss --field=version

Verify Fix Applied:

Verify Nuss theme version is higher than 1.3.3 in WordPress admin panel > Appearance > Themes.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to theme administration endpoints from unauthorized IPs
  • Multiple failed authorization attempts followed by successful access to protected functions
  • Theme modification activities from non-admin users

Network Indicators:

  • HTTP requests to Nuss theme admin endpoints from unauthorized sources
  • Unusual POST requests to theme configuration endpoints

SIEM Query:

source="wordpress.log" AND ("nuss" OR "theme") AND ("admin" OR "ajax") AND status=200 AND user_role!=administrator

🔗 References

📤 Share & Export