Privilege Escalation Vulnerability in Soledad Theme Affectin... #1661
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
The article documents a critical Subscriber+ privilege escalation vulnerability in the commercial WordPress Soledad theme (by PenciDesign), affecting versions ≤ 8.6.9. The issue is tracked as CVE-2025-64188, with a reported impact on ~57,000 sites and a CVSS score of 9.8, and has been patched in version 8.6.9.1.
How the Soledad theme functionality works
Soledad includes a custom AJAX endpoint i...
🔧 Technical Details
Abusing weakly protected WordPress AJAX option updaters for privilege escalation
If a WordPress theme or plugin exposes an authenticated AJAX action that calls
update_option()(or similar) based on user-suppliedoption_nameandoption_val, and protects it only with a nonce viacheck_ajax_referer()but no capability check (e.g.current_user_can( 'manage_options' )), any low-privileged backend user who can access/wp-adminand see the nonce can arbitrarily change WordPress options.The practical attack pattern is:
ajax-nonce) in HTML source or AJAX requests./wp-admin/admin-ajax.phpwithaction=<vulnerable_acti...- Expanded
- Added Patchstack’s Soledad theme advisory to the References section so the new content is properly sourced.
- Not applicable (documentation updates only).
🤖 Agent Actions
Summary:
network-services-pentesting/pentesting-web/wordpress.mdwith a new subsection on “WordPress AJAX option updaters without capability checks,” covering the Soledad theme vulnerability as a generalized technique. Included vulnerable code pattern, a Subscriber→Administrator exploitation chain using craftedadmin-ajax.phprequests, and a detailed detection/hardening checklist emphasizing capability enforcement aroundupdate_option()handlers.Testing:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.