CVE-2025-13618

Mentoring · Mentoring Plugin for WordPress

The Mentoring plugin for WordPress contains a privilege escalation vulnerability that allows unauthenticated attackers to register as administrators.

Executive summary

A critical privilege escalation vulnerability in the Mentoring WordPress plugin allows unauthenticated users to register and gain administrative access to the platform.

Vulnerability

The plugin fails to properly restrict registration roles in the mentoring_process_registration() function. This allows an unauthenticated attacker to supply a role parameter during the registration process, granting them elevated privileges upon account creation.

Business impact

An attacker gaining administrative access can compromise the entire site, inject malicious scripts, steal sensitive user data, or disable security measures. The CVSS score of 9.8 underscores the gravity of this vulnerability, as it provides a trivial path to full system ownership.

Remediation

Immediate Action: Update the Mentoring plugin to the latest version, which includes strict role validation during the registration process.

Proactive Monitoring: Review the user list for any unauthorized administrator accounts created recently and monitor registration logs for suspicious role-assignment attempts.

Compensating Controls: Disable public user registration on the WordPress site until the plugin can be updated to prevent exploitation.

Exploitation status

Public Exploit Available: No

Analyst recommendation

This vulnerability provides an immediate and easy path to administrative compromise. It is imperative that administrators either patch the plugin immediately or disable the registration features until a secure version is deployed.