Overview
The vulnerability identified as CVE-2025-5954 is a serious security flaw found in the Service Finder SMS System plugin for WordPress. This plugin, popular among WordPress users, has a vulnerability that allows for privilege escalation through account takeover. This flaw affects all versions of the plugin up to, and including, 2.0.0. This vulnerability matters because it can potentially lead to a full system compromise or data leakage, posing a significant risk to WordPress sites that utilize this plugin.
Vulnerability Summary
CVE ID: CVE-2025-5954
Severity: Critical (CVSS: 9.8)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise or data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Service Finder SMS System for WordPress | Up to and including 2.0.0
How the Exploit Works
The vulnerability lies in the aonesms_fn_savedata_after_signup() function of the Service Finder SMS System plugin, which does not restrict user role selection at the time of registration. This allows an unauthenticated attacker to register as an administrator user on the WordPress site. Once registered as an administrator, the attacker gains full access to the WordPress site and can perform any action, potentially leading to system compromise or data leakage.
Conceptual Example Code
The following is a conceptual example of how the vulnerability might be exploited. This is a sample HTTP POST request that an attacker might send to exploit the vulnerability:
POST /wp-json/aonesms/v1/register HTTP/1.1
Host: target.example.com
Content-Type: application/json
{
"user_login": "attacker",
"user_pass": "password",
"user_email": "attacker@example.com",
"role": "administrator"
}
In this example, the attacker is registering a new user with the username “attacker”, password “password”, and email “attacker@example.com” with the role of “administrator”. This request bypasses the intended registration process and directly assigns the attacker the role of an administrator.
Mitigation Guidance
To mitigate this vulnerability, it is recommended that users apply the vendor patch once it becomes available. Until then, users may choose to implement a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) as a temporary workaround. These solutions can detect and prevent attempts to exploit this vulnerability. However, they are not permanent solutions and do not fix the underlying issue within the plugin. Users should apply the vendor patch as soon as possible for lasting protection.