CVE-2025-14397
Postem Ipsum <= 3.0.1 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation in postem_ipsum_generate_users
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
The Postem Ipsum plugin for WordPress is vulnerable to unauthorized modification of data to Privilege Escalation due to a missing capability check on the postem_ipsum_generate_users() function in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary user accounts with the administrator role.
| CWE | CWE-862 |
| Vendor | franciscopalacios |
| Product | postem ipsum |
| Published | Dec 13, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for franciscopalacios postem ipsum
Be the first to know when new high vulnerabilities affecting franciscopalacios postem ipsum are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
franciscopalacios / Postem Ipsum
0 โค 3.0.1
References
Credits
Kenneth Dunn