CVE-2025-8572

9.8 CRITICAL

📋 TL;DR

The Truelysell Core WordPress plugin allows unauthenticated attackers to create administrator accounts due to insufficient validation of the user_role parameter during registration. This affects all WordPress sites using Truelysell Core plugin versions 1.8.7 and earlier. Attackers can gain full control of vulnerable WordPress installations.

💻 Affected Systems

Products:
  • Truelysell Core WordPress Plugin
Versions: <= 1.8.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin version enabled, regardless of other security configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover with attacker gaining administrator access, installing backdoors, defacing content, stealing data, and using the compromised site for further attacks.

🟠

Likely Case

Attackers create administrator accounts to gain persistent access, install malicious plugins/themes, modify content, and potentially compromise the entire WordPress installation.

🟢

If Mitigated

With proper monitoring and immediate response, unauthorized admin accounts can be detected and removed before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and minimal technical skill to exploit, making it highly attractive to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.8 or later

Vendor Advisory: https://themeforest.net/item/truelysell-service-booking-wordpress-theme/43398124

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Truelysell Core plugin. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 1.8.8+ from ThemeForest and replace plugin files.

🔧 Temporary Workarounds

Disable User Registration

all

Temporarily disable WordPress user registration to prevent exploitation while patching.

wp option update users_can_register 0

Deactivate Plugin

all

Temporarily deactivate the Truelysell Core plugin until patched.

wp plugin deactivate truelysell-core

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block requests containing user_role parameter manipulation
  • Enable detailed logging of user registration events and monitor for suspicious admin account creation

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Truelysell Core version number. If version is 1.8.7 or lower, you are vulnerable.

Check Version:

wp plugin get truelysell-core --field=version

Verify Fix Applied:

After updating, verify plugin version shows 1.8.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user registration events
  • New administrator account creation from unfamiliar IPs
  • POST requests to registration endpoints with user_role parameter

Network Indicators:

  • HTTP POST requests to /wp-admin/admin-ajax.php or registration endpoints with user_role parameter set to administrator roles

SIEM Query:

source="wordpress.log" AND ("user_registered" OR "new_user") AND ("administrator" OR "admin" OR "role")

🔗 References

📤 Share & Export