CVE-2025-5701

HIGH

CVSS v3

8.8

HIGH

EPSS Score

13.4%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user

Technical Details

CVSS v3 Vector
3.1
Published
6/5/2025
Last Modified
4/15/2026

Frequently Asked Questions

What is CVE-2025-5701?

The HyperComments plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the hc_request_handler function in all versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user

Is CVE-2025-5701 actively exploited?

Active exploitation of CVE-2025-5701 has not been confirmed. The EPSS score is 13.4%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-5701?

CVE-2025-5701 has a CVSS v3 base score of 8.8 (HIGH severity), with vector string 3.1.

Is CVE-2025-5701 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.