Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-13851 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Buyent Classified plugin fails to validate user roles during REST API registration. <br>⚠️ **Consequences**: Attackers can register accounts with **arbitrary roles**, including **Administrator**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE**: CWE-269 (Improper Privilege Management). <br>πŸ” **Flaw**: The plugin does not check or restrict user roles when registering via the REST API endpoint. No validation logic exists.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Vendor**: scriptsbundle. <br>πŸ“¦ **Product**: Buyent Classified (WordPress Plugin). <br>πŸ“‰ **Affected**: Version **1.0.7 and earlier**. Update immediately if you are on these versions.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Privileges**: Attackers gain **Admin** access. <br>πŸ“‚ **Data**: Full read/write access to the WordPress site. <br>🌐 **Impact**: CVSS Score is **Critical (9.8)**.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. <br>πŸ”“ **Auth**: **None required** (Unauthenticated). <br>βš™οΈ **Config**: Simple REST API call. <br>🎯 **UI**: No user interaction needed. Easy to exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp?**: No PoC or wild exploitation data provided in the source. <br>⚠️ **Risk**: Despite no public code, the flaw is trivial. Exploitation tools likely exist or are easily written.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for Buyent Classified plugin version. <br>πŸ› οΈ **Feature**: Test REST API registration endpoints for role validation. <br>πŸ“Š **Tool**: Use vulnerability scanners detecting CWE-269 in WordPress plugins.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ”§ **Patch**: Update Buyent Classified to the latest version. <br>βœ… **Status**: Vendor (scriptsbundle) should release a fix. Check official channels for the patched release.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable REST API registration if possible. <br>πŸ›‘οΈ **Mitigation**: Use a WAF to block suspicious registration requests.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. <br>⏱️ **Priority**: Patch **IMMEDIATELY**. <br>🚨 **Reason**: Unauthenticated Admin access is a game-over scenario. Do not wait for public exploits.