CVE-2025-5483

8.1 HIGH

📋 TL;DR

The LC Wizard WordPress plugin has a privilege escalation vulnerability that allows unauthenticated attackers to create administrator accounts when PRO functionality is enabled. This affects WordPress sites running plugin versions 1.2.10 through 1.3.0. Attackers can gain full control of vulnerable websites.

💻 Affected Systems

Products:
  • WordPress LC Wizard plugin
Versions: 1.2.10 to 1.3.0
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when PRO functionality is enabled. Standard installations without PRO features are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with attacker creating admin accounts, installing backdoors, defacing content, stealing data, and using the site for further attacks.

🟠

Likely Case

Attackers create hidden admin accounts to maintain persistent access, install malware, or use the site for spam/phishing campaigns.

🟢

If Mitigated

If proper network controls exist, the attack might be detected and blocked before full compromise, limiting damage to attempted intrusion.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted HTTP requests to the vulnerable endpoint. No authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.1

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3366906

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find LC Wizard plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.3.1 from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable PRO functionality

all

Temporarily disable the PRO features that enable the vulnerable code path

Disable plugin

all

Completely disable the LC Wizard plugin until patched

🧯 If You Can't Patch

  • Implement web application firewall rules to block requests to /ghl-wizard/inc/wp_user.php
  • Restrict access to WordPress admin functions from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > LC Wizard version. If between 1.2.10 and 1.3.0 and PRO features enabled, you are vulnerable.

Check Version:

wp plugin list --name='LC Wizard' --field=version

Verify Fix Applied:

Verify plugin version is 1.3.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /ghl-wizard/inc/wp_user.php
  • Unexpected user creation events in WordPress logs
  • New administrator accounts created from unfamiliar IPs

Network Indicators:

  • HTTP requests to vulnerable endpoint with user creation parameters
  • Traffic spikes to WordPress admin functions

SIEM Query:

source="wordpress.log" AND (uri_path="/ghl-wizard/inc/wp_user.php" OR message="New user created" OR message="User role changed to administrator")

🔗 References

📤 Share & Export