
PEACH
Un cadre d’isolation des locataires
CVE-2025-11855 affects the age-restriction WordPress plugin through version 3.0.2. The vulnerability was discovered by Khaled Alenazi and publicly disclosed on October 21, 2025. The issue exists in the age_restrictionRemoteSupportRequest function, which lacks proper authorization controls (WPScan).
The vulnerability stems from missing authorization checks in the age_restrictionRemoteSupportRequest function. This security flaw allows any authenticated user, including those with subscriber-level privileges, to create an administrative user account with a hardcoded username and arbitrary password. The CVSS score for this vulnerability is 7.5 (high), and it is classified as a privilege escalation vulnerability under CWE-269 (WPScan).
The vulnerability allows authenticated users with minimal privileges (subscriber level) to escalate their privileges to administrative access. This can lead to complete compromise of the WordPress installation, as the attacker can create an admin user with the hardcoded username 'aateam_support' and a password of their choosing (WPScan).
Currently, there is no known fix available for this vulnerability. Users of the age-restriction plugin should consider disabling the plugin until a security update is released (WPScan).
Source: Ce rapport a été généré à l’aide de l’IA
Évaluation gratuite des vulnérabilités
Évaluez vos pratiques de sécurité cloud dans 9 domaines de sécurité pour évaluer votre niveau de risque et identifier les failles dans vos défenses.
Obtenez une démo personnalisée
"La meilleure expérience utilisateur que j’ai jamais vue, offre une visibilité totale sur les workloads cloud."
"Wiz fournit une interface unique pour voir ce qui se passe dans nos environnements cloud."
"Nous savons que si Wiz identifie quelque chose comme critique, c’est qu’il l’est réellement."