Privilege Escalation in PenciDesign Soledad Theme
CVE-2025-64188

9.8CRITICAL

Key Information:

Vendor

WordPress

Status
Vendor
CVE Published:
18 December 2025

What is CVE-2025-64188?

CVE-2025-64188 is a vulnerability found in the PenciDesign Soledad WordPress theme, which is widely used for creating customizable and visually appealing websites. The flaw is categorized as an incorrect privilege assignment, allowing users to escalate their privileges beyond what is intended. This issue affects versions of the Soledad theme up to and including 8.6.9. If exploited, this vulnerability could potentially allow unauthorized users to gain elevated access rights within the application. Such unauthorized access can lead to significant risks, such as the ability to modify website content, access sensitive user information, or perform administrative actions that could compromise the integrity and security of the website.

Potential impact of CVE-2025-64188

  1. Unauthorized Access and Control: The vulnerability allows attackers to elevate their privileges, potentially granting them full control over the website. This can lead to unauthorized modifications, content manipulation, and the ability to deploy malicious code.

  2. Data Breaches: Exploiting this vulnerability could enable attackers to access sensitive user data, including personal information of site visitors or internal data, leading to privacy violations and regulatory repercussions.

  3. Reputational Damage: Organizations affected by this vulnerability may suffer from a loss of trust among users and customers when they become targets of exploitation, leading to a damaged reputation and possible loss of business.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Soledad <= n/a

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Denver Jackson | Patchstack Bug Bounty Program
.