CVE-2025-5701
HIGHCVSS v3
8.8
HIGH
EPSS Score
13.4%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 6/5/2025
- Last Modified
- 4/15/2026
Frequently Asked Questions
What is CVE-2025-5701?
The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user
Is CVE-2025-5701 actively exploited?
Active exploitation of CVE-2025-5701 has not been confirmed. The EPSS score is 13.4%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2025-5701?
CVE-2025-5701 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.
Is CVE-2025-5701 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.