Support for CitiLights – Real Estate WordPress Theme Vulnerability …

Support for CitiLights – Real Estate WordPress Theme Vulnerability …

by | Feb 25, 2026 | Themes

Attack Vectors

CVE-2026-25367 is a Medium severity (CVSS 5.3) missing authorization issue affecting the Support for CitiLights – Real Estate WordPress Theme (slug: noo-citilights) in versions reported as up to 3.7.2. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) indicates the attack can be performed remotely over the network, requires no login, and needs no user interaction.

In practical terms, an unauthenticated attacker could probe exposed theme functionality and attempt to trigger the vulnerable function to carry out an unauthorized action on your WordPress site.

Security Weakness

The underlying weakness is a missing capability check (authorization control) on a theme function. When capability checks are absent, WordPress cannot reliably enforce “who is allowed to do what,” which can allow requests from unauthenticated visitors to reach actions that should be restricted to trusted roles (such as administrators or editors).

This vulnerability is documented by Wordfence and tracked as CVE-2026-25367.

Technical or Business Impacts

Although this issue is rated Medium and does not indicate direct data exposure (CVSS shows no confidentiality impact), it does carry a potential integrity impact. Unauthorized actions can still create meaningful business risk, including unwanted changes that affect site content, lead capture workflows, property listings, branding, SEO performance, or user experience.

From a business and compliance perspective, even “limited” unauthorized changes can lead to operational disruption (time spent investigating and restoring content), marketing performance impacts (broken landing pages, misdirected calls-to-action, altered forms), and reputational damage if customers see inaccurate listings or messaging.

Remediation: Follow vendor guidance to update the CitiLights theme to version 3.7.2, or to a newer patched version if available. In parallel, reduce exposure by limiting unnecessary public endpoints, keeping WordPress core/plugins/themes updated, and monitoring for unexpected changes.

Similar attacks (real examples): Authorization and access-control gaps are a common root cause in WordPress incidents. For context, see CVE-2024-27956 (a widely discussed WordPress plugin authentication/access issue), CVE-2023-2745 (WordPress-related authorization concerns in the ecosystem), and CVE-2021-29447 (a WordPress core media issue that was actively monitored due to broad exposure). These examples illustrate how quickly widely deployed WordPress components can become targets once weaknesses are public.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers