CVE-2025-52804
📋 TL;DR
This CVE describes a missing authorization vulnerability in the uxper Nuss WordPress theme that allows attackers to access functionality not properly constrained by access control lists. Attackers can perform actions intended only for authorized users. This affects all WordPress sites using Nuss theme versions up to and including 1.3.3.
💻 Affected Systems
- uxper Nuss WordPress Theme
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify site content, change settings, access sensitive data, or perform administrative actions leading to complete site compromise.
Likely Case
Unauthorized users can access privileged functionality such as modifying theme settings, changing site appearance, or accessing restricted content.
If Mitigated
With proper access controls, only authorized users can access administrative functions, limiting impact to intended functionality.
🎯 Exploit Status
The vulnerability involves broken access control, which typically requires minimal technical skill to exploit once the vulnerable endpoints are identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 1.3.3
Vendor Advisory: https://patchstack.com/database/wordpress/theme/nuss/vulnerability/wordpress-nuss-1-3-3-broken-access-control-vulnerability?_s_id=cve
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Appearance > Themes. 3. Check for Nuss theme updates. 4. Update to the latest version. 5. Alternatively, replace with a different theme if updates are unavailable.
🔧 Temporary Workarounds
Disable Nuss Theme
allSwitch to a different WordPress theme that doesn't have this vulnerability
wp theme activate twentytwentyfour
wp theme delete nuss
Restrict Access via Web Application Firewall
allBlock access to vulnerable theme endpoints using WAF rules
🧯 If You Can't Patch
- Switch to a different WordPress theme immediately
- Implement strict network access controls to limit who can access the WordPress admin interface
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Appearance > Themes for Nuss theme version. If version is 1.3.3 or lower, the system is vulnerable.
Check Version:
wp theme list --name=nuss --field=version
Verify Fix Applied:
Verify Nuss theme version is higher than 1.3.3 in WordPress admin panel > Appearance > Themes.
📡 Detection & Monitoring
Log Indicators:
- Unusual access to theme administration endpoints from unauthorized IPs
- Multiple failed authorization attempts followed by successful access to protected functions
- Theme modification activities from non-admin users
Network Indicators:
- HTTP requests to Nuss theme admin endpoints from unauthorized sources
- Unusual POST requests to theme configuration endpoints
SIEM Query:
source="wordpress.log" AND ("nuss" OR "theme") AND ("admin" OR "ajax") AND status=200 AND user_role!=administrator