CVE-2025-13563
Published: 19 February 2026
Summary
CVE-2025-13563 is a critical-severity Improper Privilege Management (CWE-269) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 12.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces least privilege to prevent assignment of administrator roles during unauthenticated user registration.
Manages account creation processes to restrict self-registration to authorized roles only, blocking arbitrary role specification.
Validates user-supplied role inputs in the registration function to reject unauthorized roles like administrator.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is a privilege escalation in a public-facing WordPress plugin, allowing unauthenticated attackers to gain administrator access, directly enabling T1068 (Exploitation for Privilege Escalation) and T1190 (Exploit Public-Facing Application).
NVD Description
The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes it…
more
possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.
Deeper analysisAI
CVE-2025-13563 is a privilege escalation vulnerability in the Lizza LMS Pro plugin for WordPress, affecting all versions up to and including 1.0.3. The flaw arises in the 'lizza_lms_pro_register_user_front_end' function, which does not restrict the user roles that can be assigned during front-end registration, allowing arbitrary role specification.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges or user interaction required. By supplying the 'administrator' role during registration, they gain full administrator access to the site, enabling high-impact confidentiality, integrity, and availability violations, as reflected in the CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and mapped to CWE-269 (Improper Privilege Management).
Advisories from Wordfence detail the issue and recommend mitigation. Security practitioners should consult the Wordfence threat intelligence report and the plugin's ThemeForest page for patching guidance, with updates to versions beyond 1.0.3 addressing the vulnerability where available.
Details
- CWE(s)