Buyent Vulnerability (Critical) – CVE-2025-13851

Buyent Vulnerability (Critical) – CVE-2025-13851

by | Feb 18, 2026 | Themes

Attack Vectors

Buyent Theme (bundled with the Buyent Classified plugin, slug buyent) has a Critical vulnerability (CVSS 9.8, CVE-2025-13851) that can be exploited remotely over the internet. The issue involves the user registration flow exposed through a REST API endpoint.

An unauthenticated attacker can abuse the registration process by manipulating a registration parameter (_buyent_classified_user_type) to assign themselves an elevated role. Because the role is not properly validated or restricted, the attacker can potentially register directly as an administrator without needing any prior access.

Security Weakness

The underlying weakness is insufficient authorization control during user registration. In affected versions (<= 1.0.7), the Buyent Classified plugin does not adequately validate or limit which user roles can be assigned when a new user account is created via the REST API.

In practical terms, this means a critical security rule is missing: new users should never be able to choose privileged roles (such as administrator) during self-registration. When that control fails, “sign up” becomes “take over.”

Technical or Business Impacts

If exploited, this vulnerability can grant an attacker complete control of the WordPress site. With administrator access, they can change content, add or remove users, alter settings, install plugins/themes, and potentially establish ongoing access that survives password changes.

For marketing leadership and executives, the business risks are immediate and high: defacement of high-visibility pages, unauthorized redirects that damage paid campaigns and SEO, lead-capture form tampering, and loss of customer trust. A successful takeover can also trigger compliance and incident response obligations, increase legal exposure, and cause revenue-impacting downtime.

Remediation

No known patch is available at this time for Buyent Theme / Buyent Classified plugin versions up to and including 1.0.7. Given the severity (Critical) and the fact that exploitation can be performed without authentication, organizations should treat this as an urgent risk decision.

Risk-based mitigation options include: uninstalling the affected Buyent theme/plugin and replacing it; disabling public user registration if it is not strictly required; restricting access to the affected registration REST API endpoint where feasible; and increasing monitoring for suspicious new administrator accounts and unexpected configuration changes.

Reference: CVE-2025-13851 and the source advisory from Wordfence Threat Intelligence.

Similar Attacks

Unauthenticated or low-friction privilege escalation has been a recurring theme in major WordPress incidents, where attackers gain administrative control and then pivot to site takeover actions (malicious redirects, spam injections, backdoors). Examples include:

File Manager plugin (2020) — critical issue exploited in the wild

Elementor Pro (2021) — critical vulnerability leveraged for site compromise

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers