CVE-2025-67966

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to escalate privileges in the Lawyer Directory WordPress plugin due to incorrect privilege assignment. Attackers could gain administrative access to affected WordPress sites. All WordPress installations using Lawyer Directory plugin versions up to and including 1.3.3 are affected.

💻 Affected Systems

Products:
  • WordPress Lawyer Directory plugin
Versions: n/a through <= 1.3.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the Lawyer Directory plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain full administrative control, can install backdoors, steal sensitive data, deface the site, or use it for further attacks.

🟠

Likely Case

Attackers gain elevated privileges to modify content, access user data, or install malicious plugins/themes.

🟢

If Mitigated

Limited impact if proper access controls, monitoring, and least privilege principles are already implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Privilege escalation vulnerabilities in WordPress plugins are commonly exploited. Requires some level of access to initiate.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.3.3

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/lawyer-directory/vulnerability/wordpress-lawyer-directory-plugin-1-3-3-privilege-escalation-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Lawyer Directory plugin
4. Click 'Update Now' if update available
5. If no update available, deactivate and remove plugin immediately

🔧 Temporary Workarounds

Disable Lawyer Directory Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate lawyer-directory

Restrict Plugin Access

all

Use WordPress security plugins to restrict access to plugin functionality

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual administrative activity
  • Deploy web application firewall rules to detect privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Lawyer Directory version

Check Version:

wp plugin get lawyer-directory --field=version

Verify Fix Applied:

Verify plugin version is >1.3.3 and test privilege escalation attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Unusual user role changes in WordPress logs
  • Multiple failed login attempts followed by successful admin login from new IP
  • Plugin activation/deactivation logs for Lawyer Directory

Network Indicators:

  • HTTP POST requests to lawyer-directory admin endpoints from unauthorized users

SIEM Query:

source="wordpress" AND (event="user_role_changed" OR event="plugin_activated" AND plugin="lawyer-directory")

🔗 References

📤 Share & Export