CVE-2025-14892
WordPress · Prime Listing Manager (Plugin)
The Prime Listing Manager plugin for WordPress contains a hardcoded secret that allows unauthenticated attackers to gain administrative access to the targeted website.
Executive summary
A hardcoded secret in the Prime Listing Manager WordPress plugin allows unauthenticated attackers to bypass authentication and gain full administrative control of the site.
Vulnerability
The plugin uses a hardcoded secret for authentication or authorization checks. An unauthenticated attacker can use this secret to impersonate an administrator and perform unauthorized actions without needing a valid account.
Business impact
With a CVSS score of 9.8, this vulnerability is critical. An attacker can completely take over a WordPress site, leading to the theft of user data, the injection of malicious scripts (SEO spam or malware), and the total loss of site integrity and reputation.
Remediation
Immediate Action: Deactivate and delete the Prime Listing Manager plugin immediately until a patched version is confirmed and available.
Proactive Monitoring: Check for the creation of unauthorized administrative accounts and review WordPress access logs for unusual activity originating from the plugin's directory.
Compensating Controls: Use a Web Application Firewall (WAF) to block common exploit patterns targeting WordPress plugins and enforce strong file permissions on the server.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The use of hardcoded secrets is a fundamental security failure. Administrators should remove the affected plugin immediately and perform a security audit of their WordPress site to ensure no backdoors were installed during the period of vulnerability.