
Cloud Vulnerability DB
A community-led vulnerabilities database
The CVE-2025-54735 vulnerability affects the CubeWP Framework WordPress plugin, versions up to and including 1.1.24. This security flaw was discovered by Martino Spagnuolo and publicly disclosed on August 19, 2025. The vulnerability is classified as an Incorrect Privilege Assignment issue that allows for privilege escalation in the CubeWP Framework (Patchstack, Rapid7).
The vulnerability stems from improper restriction of user meta key updates through the cwpsaveuserfields() function. The severity of this vulnerability is rated as High with a CVSS v3.1 score of 8.8 (Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The vulnerability is categorized under CWE-266 (Incorrect Privilege Assignment) ([Patchstack](https://patchstack.com/database/wordpress/plugin/cubewp-framework/vulnerability/wordpress-cubewp-framework-plugin-1-1-24-privilege-escalation-vulnerability?s_id=cve)).
The vulnerability allows authenticated attackers with Subscriber-level access or higher to elevate their privileges to administrator level, potentially gaining full control of the affected WordPress website (Rapid7).
Website administrators are advised to update to CubeWP Framework version 1.1.25 or later, which contains the fix for this vulnerability. For users of Patchstack, a virtual patch has been issued to mitigate this issue by blocking potential attacks until the update can be applied (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."