CVE-2025-8899

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated WordPress users with Author-level access or higher to register administrator accounts through a registration form. Attackers can create posts/pages containing a malicious registration form that sets the administrator role, then use that form to gain administrative privileges. All WordPress sites using the Paid Videochat Turnkey Site – HTML5 PPV Live Webcams plugin up to version 7.3.20 are affected.

💻 Affected Systems

Products:
  • Paid Videochat Turnkey Site – HTML5 PPV Live Webcams WordPress plugin
Versions: All versions up to and including 7.3.20
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access (Author role or higher) and ability to create posts/pages containing the registration form shortcode.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise where attackers gain full administrative control, can install backdoors, steal sensitive data, deface the site, or use it for further attacks.

🟠

Likely Case

Attackers with Author access escalate to Administrator, gaining full control over the WordPress installation and potentially the underlying server.

🟢

If Mitigated

Attackers cannot escalate privileges beyond their current role, maintaining proper access controls and separation of duties.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once an attacker has Author privileges. The vulnerability is well-documented with code references available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.21 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3348788/ppv-live-webcams

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Paid Videochat Turnkey Site – HTML5 PPV Live Webcams'. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 7.3.21+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate ppv-live-webcams

Restrict user capabilities

all

Limit Author and Contributor users from creating or editing pages/posts containing shortcodes

🧯 If You Can't Patch

  • Remove Author and Contributor access from untrusted users
  • Implement web application firewall rules to block registration requests with administrator role parameter

🔍 How to Verify

Check if Vulnerable:

Check plugin version in WordPress admin under Plugins → Installed Plugins. If version is 7.3.20 or lower, the site is vulnerable.

Check Version:

wp plugin get ppv-live-webcams --field=version

Verify Fix Applied:

Verify plugin version is 7.3.21 or higher. Test registration form functionality to ensure role parameter is properly validated.

📡 Detection & Monitoring

Log Indicators:

  • User registration events with administrator role
  • POST requests to registration endpoints with role=administrator parameter
  • Unauthorized users gaining administrator privileges

Network Indicators:

  • HTTP POST requests containing videowhisper_register_form parameters with elevated role values

SIEM Query:

source="wordpress" AND (event="user_registered" AND role="administrator") OR (url_path="/wp-admin/admin-ajax.php" AND post_data CONTAINS "videowhisper_register_form" AND post_data CONTAINS "role=administrator")

🔗 References

📤 Share & Export