CVE-2025-13680

WordPress · WordPress Tiger theme

A high-severity privilege escalation vulnerability has been discovered in the Tiger theme for WordPress.

Executive summary

A high-severity privilege escalation vulnerability has been discovered in the Tiger theme for WordPress. This flaw could allow a low-privileged user, such as a subscriber, to illegitimately gain administrative control over an affected website. Successful exploitation could lead to a complete site compromise, data theft, and significant reputational damage.

Vulnerability

The vulnerability exists due to insufficient capability checks on a function within the theme designed to handle user role modifications. An authenticated attacker with low-level permissions (e.g., a subscriber) can craft a specific request to this function. By manipulating the parameters in this request, the attacker can bypass security controls and assign the 'administrator' role to their own account, effectively taking full control of the WordPress site.

Business impact

This is a High severity vulnerability with a CVSS score of 8.8. Exploitation of this flaw poses a significant risk to the business. An attacker with administrative access can deface the website, steal sensitive customer or user data, install malicious backdoors, inject malware to infect site visitors, and use the server for further malicious activities. Such a compromise can result in direct financial loss, regulatory fines, loss of customer trust, and severe damage to the organization's brand and reputation.

Remediation

Immediate Action: Immediately update the Tiger theme for WordPress to the latest patched version provided by the vendor. If the theme is no longer in use or is not critical to business operations, consider deactivating and removing it entirely to eliminate the attack surface. After applying the patch, conduct a thorough audit of all user accounts, especially those with administrative privileges, to identify and remove any unauthorized accounts or suspicious role changes.

Proactive Monitoring: Monitor web server access logs for unusual POST requests to theme-specific files or WordPress admin functions like admin-ajax.php. Implement file integrity monitoring to detect unauthorized changes to core WordPress, theme, or plugin files. Regularly review security audit logs for unexpected user role escalations, new user registrations with high privileges, or other anomalous user activity.

Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with rules specifically designed to block exploit attempts targeting this vulnerability. Restrict access to the WordPress administrative dashboard (/wp-admin/) to trusted IP addresses. Enforce the principle of least privilege by regularly reviewing user roles and capabilities, ensuring users only have the permissions necessary for their tasks.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high severity (CVSS 8.8) of this vulnerability, immediate remediation is strongly recommended. Organizations must prioritize the deployment of the vendor-supplied patch for the Tiger theme across all relevant WordPress instances. Although this vulnerability is not currently on the CISA KEV list, its critical impact on confidentiality, integrity, and availability makes it a prime candidate for future inclusion. A patch-and-audit approach should be adopted immediately to mitigate risk and verify that no prior compromise has occurred.