CVE-2025-67579

5.3 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the WordPress User Extra Fields plugin (wp-user-extra-fields) that allows attackers to exploit incorrectly configured access control security levels. It affects all versions up to and including 16.8, potentially enabling unauthorized access to user data or administrative functions.

💻 Affected Systems

Products:
  • WordPress User Extra Fields plugin (wp-user-extra-fields)
Versions: All versions up to and including 16.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations using the vulnerable plugin version. The vulnerability exists in the plugin's access control implementation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify user profiles, escalate privileges, access sensitive user data, or manipulate plugin settings to compromise the WordPress site.

🟠

Likely Case

Unauthorized users could view or modify user profile fields they shouldn't have access to, potentially exposing personal information or altering user settings.

🟢

If Mitigated

With proper access controls and authentication checks, the vulnerability would be prevented from being exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the WordPress site but bypasses authorization checks. The vulnerability is in the access control logic rather than requiring complex technical exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 16.8

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/wp-user-extra-fields/vulnerability/wordpress-user-extra-fields-plugin-16-8-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'User Extra Fields' plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the User Extra Fields plugin until patched

wp plugin deactivate wp-user-extra-fields

Restrict plugin access

all

Use WordPress roles and capabilities to restrict who can access plugin functions

🧯 If You Can't Patch

  • Implement strict access controls at the web application firewall level to monitor and block suspicious requests to plugin endpoints.
  • Enable detailed logging for all user profile modification attempts and monitor for unauthorized access patterns.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'User Extra Fields' version. If version is 16.8 or lower, you are vulnerable.

Check Version:

wp plugin get wp-user-extra-fields --field=version

Verify Fix Applied:

After updating, verify plugin version shows higher than 16.8 in WordPress admin plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user profile modification requests
  • Access to wp-user-extra-fields endpoints from unauthorized users
  • Failed authorization attempts for plugin functions

Network Indicators:

  • HTTP requests to /wp-content/plugins/wp-user-extra-fields/ endpoints with unexpected parameters
  • POST requests to user profile endpoints from non-admin users

SIEM Query:

source="wordpress.log" AND ("wp-user-extra-fields" OR "user_extra_fields") AND (action="edit" OR action="update") AND user_role!="administrator"

🔗 References

📤 Share & Export