CVE-2025-8059

9.8 CRITICAL

📋 TL;DR

The B Blocks WordPress plugin has a critical privilege escalation vulnerability that allows unauthenticated attackers to create new administrator accounts. This affects all WordPress sites using B Blocks versions 2.0.6 and earlier. Attackers can gain full administrative control over vulnerable WordPress installations.

💻 Affected Systems

Products:
  • B Blocks WordPress Plugin
Versions: All versions up to and including 2.0.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin activated. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with attacker gaining administrator privileges, installing backdoors, defacing content, stealing data, and using the compromised site for further attacks.

🟠

Likely Case

Attackers create hidden administrator accounts to maintain persistent access, then deploy malware, redirect traffic, or use the site for phishing campaigns.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the affected WordPress instance, but administrative control is still lost.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires sending crafted HTTP requests to the vulnerable registration endpoint. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.7 or later

Vendor Advisory: https://wordpress.org/plugins/b-blocks/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find B Blocks plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and delete plugin immediately.

🔧 Temporary Workarounds

Disable B Blocks Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate b-blocks

Block Registration Endpoint

linux

Block access to the vulnerable registration function via web server configuration

# Apache: <LocationMatch "rgfr_registration"> Deny from all </LocationMatch>
# Nginx: location ~* rgfr_registration { deny all; }

🧯 If You Can't Patch

  • Remove B Blocks plugin completely from the WordPress installation
  • Implement strict network access controls to limit who can reach the WordPress admin interface

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for B Blocks version. If version is 2.0.6 or earlier, you are vulnerable.

Check Version:

wp plugin get b-blocks --field=version

Verify Fix Applied:

After updating, verify B Blocks version is 2.0.7 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=rgfr_registration
  • New administrator user creation from unexpected IP addresses
  • Multiple failed login attempts followed by successful login from new admin account

Network Indicators:

  • HTTP POST requests containing 'rgfr_registration' in the request body
  • Traffic to WordPress admin endpoints from previously unseen sources

SIEM Query:

source="wordpress.log" AND "rgfr_registration" AND ("role"="administrator" OR "admin")

🔗 References

📤 Share & Export