<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mentoring Plugin for WordPress — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/mentoring-plugin-for-wordpress/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 03:15:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/mentoring-plugin-for-wordpress/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Mentoring Plugin Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-mentoring-privesc/</link><pubDate>Tue, 05 May 2026 03:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-mentoring-privesc/</guid><description>The Mentoring plugin for WordPress is vulnerable to privilege escalation, allowing unauthenticated attackers to register with administrator-level user accounts due to improper role restriction in the mentoring_process_registration() function.</description><content:encoded><![CDATA[<p>The Mentoring plugin for WordPress, versions 1.2.8 and earlier, contains a critical vulnerability (CVE-2025-13618) that allows unauthenticated attackers to escalate privileges. This flaw resides in the <code>mentoring_process_registration()</code> function, which fails to properly restrict the roles that new users can register with. By exploiting this vulnerability, an attacker can bypass authentication and directly create administrator accounts, granting them full control over the affected WordPress site. This vulnerability was reported by Wordfence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Mentoring plugin (version &lt;= 1.2.8).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the registration endpoint associated with the <code>mentoring_process_registration()</code> function.</li>
<li>The crafted request includes parameters designed to register a new user account with administrator privileges.</li>
<li>Due to the insufficient role validation within the <code>mentoring_process_registration()</code> function, the plugin allows the attacker to specify the &lsquo;administrator&rsquo; role during registration.</li>
<li>The plugin creates a new user account in the WordPress database with the specified administrator role.</li>
<li>The attacker logs into the WordPress site using the newly created administrator account.</li>
<li>The attacker gains full control over the WordPress site, including the ability to modify content, install plugins, and manage user accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers complete administrative control over the affected WordPress website. This can lead to a range of malicious activities, including defacement, data theft, installation of malware, and denial of service. The impact is significant due to the ease of exploitation and the potential for widespread compromise of websites using the vulnerable plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update the Mentoring plugin for WordPress to the latest version (greater than 1.2.8) to patch CVE-2025-13618.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Mentoring Plugin Admin Registration</code> to identify potential exploitation attempts targeting the <code>mentoring_process_registration()</code> function.</li>
<li>Monitor WordPress access logs for suspicious registration attempts targeting the vulnerable plugin.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>wordpress</category><category>plugin</category></item></channel></rss>