Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-8572 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical flaw in **Truelysell Core** plugin allows unauthorized role assignment. πŸ“‰ **Consequences**: Attackers can create admin-level accounts without permission, leading to full site takeover.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-269** (Improper Privilege Management). The plugin fails to validate the `user_role` parameter during user registration. πŸ› **Flaw**: Weak input sanitization allows privilege escalation.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **Truelysell Core** plugin version **1.8.7 and earlier**. 🏒 **Vendor**: Dreamstechnologies. 🌐 **Platform**: WordPress sites using this specific booking theme/plugin.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Action**: Create new user accounts with **elevated privileges** (e.g., Admin). πŸ”“ **Impact**: Full control over the WordPress site, data theft, and malicious code injection.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: **LOW**. CVSS indicates **No Auth** (PR:N) required. 🌍 **Access**: Network accessible (AV:N), Low complexity (AC:L). Anyone can exploit this remotely.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Exploit**: Yes, public PoC available. πŸ”— **Link**: [GitHub PoC](https://github.com/richardpaimu34/CVE-2025-8572). ⚠️ **Status**: Wild exploitation risk is high due to simple vector.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for **Truelysell Core** plugin version ≀ 1.8.7. πŸ“ **Feature**: Look for user registration endpoints accepting `user_role` parameters without server-side validation.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update **Truelysell Core** to the latest version immediately. πŸ“’ **Source**: Check vendor (Dreamstechnologies) or WordPress repository for patched releases.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If patching is delayed, **disable public registration** or restrict user roles via server-side rules. πŸ›‘ Block access to registration endpoints if possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. CVSS Score is High (likely 9.8+). πŸš€ **Action**: Patch immediately. This is a remote, unauthenticated privilege escalation. Do not wait.