INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Mobile Devices / Consumer Electronics HIGH 2h Global ransomware Multiple sectors CRITICAL 2h Global malware Networking / Infrastructure CRITICAL 3h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 4h Global supply_chain Software Development and DevOps CRITICAL 5h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors HIGH 8h Global general Digital Content & Intellectual Property MEDIUM 8h Global malware Technology and Software Development CRITICAL 8h Global ddos Technology and Social Media HIGH 9h Global vulnerability Mobile Devices / Consumer Electronics HIGH 2h Global ransomware Multiple sectors CRITICAL 2h Global malware Networking / Infrastructure CRITICAL 3h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 4h Global supply_chain Software Development and DevOps CRITICAL 5h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors HIGH 8h Global general Digital Content & Intellectual Property MEDIUM 8h Global malware Technology and Software Development CRITICAL 8h Global ddos Technology and Social Media HIGH 9h Global vulnerability Mobile Devices / Consumer Electronics HIGH 2h Global ransomware Multiple sectors CRITICAL 2h Global malware Networking / Infrastructure CRITICAL 3h Global ransomware Information Technology, Virtualization Infrastructure CRITICAL 4h Global supply_chain Software Development and DevOps CRITICAL 5h Global supply_chain Software Development and Technology CRITICAL 5h Global apt Multiple sectors HIGH 8h Global general Digital Content & Intellectual Property MEDIUM 8h Global malware Technology and Software Development CRITICAL 8h Global ddos Technology and Social Media HIGH 9h
Vulnerabilities

CVE-2025-15096

High
The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly va
CWE-639 — Weakness Type
Published: Feb 11, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

🤖 AI Executive Summary

The Videospirecore Theme Plugin for WordPress (versions ≤1.0.6) contains a critical privilege escalation vulnerability allowing authenticated subscribers to change administrator email addresses and reset passwords, leading to complete account takeover. This vulnerability poses significant risk to Saudi organizations using WordPress for government portals, banking websites, and corporate platforms. Immediate patching or plugin disabling is required to prevent unauthorized administrative access.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 04:03
🇸🇦 Saudi Arabia Impact Assessment
High impact on Saudi government entities (NCA, CITC), banking sector (SAMA-regulated institutions, STC), healthcare providers (MOH), and energy sector (ARAMCO subsidiaries) using WordPress. Risk is particularly acute for organizations with public-facing WordPress sites managing citizen services, financial transactions, or sensitive health/energy data. Subscriber-level compromise could lead to administrative takeover, data exfiltration, malware injection, and service disruption affecting millions of Saudi users.
🏢 Affected Saudi Sectors
Government (NCA, CITC, Ministry of Interior) Banking and Financial Services (SAMA-regulated banks) Healthcare (Ministry of Health) Energy (ARAMCO, Saudi Electricity Company) Telecommunications (STC, Mobily) Education (Universities, online learning platforms) E-commerce and Retail
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Update Videospirecore Theme Plugin to version 1.0.7 or later immediately
2. If patch unavailable, disable the plugin and remove from production
3. Audit all user accounts for unauthorized email changes in the past 30 days
4. Force password reset for all administrative and privileged accounts
5. Review WordPress user logs for suspicious account modifications

DETECTION RULES:
- Monitor wp_usermeta table for email field modifications by non-admin users
- Alert on password reset requests following email changes
- Log all user_edit actions with source IP and user role
- Flag any subscriber-level user modifying user_email or user_login fields

COMPENSATING CONTROLS (if immediate patching delayed):
- Restrict user registration to admin-only
- Implement Web Application Firewall (WAF) rules blocking POST requests to user profile endpoints from subscriber accounts
- Enable two-factor authentication (2FA) for all administrative accounts
- Implement IP whitelisting for WordPress admin panel access
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديث مكون Videospirecore Theme Plugin إلى الإصدار 1.0.7 أو أحدث فوراً
2. إذا لم يكن التحديث متاحاً، قم بتعطيل المكون وإزالته من الإنتاج
3. تدقيق جميع حسابات المستخدمين للتحقق من تغييرات البريد الإلكتروني غير المصرح بها في آخر 30 يوماً
4. فرض إعادة تعيين كلمة المرور لجميع الحسابات الإدارية والمميزة
5. مراجعة سجلات WordPress للتحقق من تعديلات الحساب المريبة

قواعد الكشف:
- مراقبة جدول wp_usermeta لتعديلات حقل البريد الإلكتروني من قبل المستخدمين غير الإداريين
- تنبيهات على طلبات إعادة تعيين كلمة المرور التي تتبع تغييرات البريد الإلكتروني
- تسجيل جميع إجراءات user_edit مع عنوان IP ودور المستخدم
- وضع علامة على أي مستخدم على مستوى المشترك يعدل حقول user_email أو user_login

الضوابط البديلة (إذا تأخر الإصلاح الفوري):
- تقييد تسجيل المستخدمين للمسؤولين فقط
- تنفيذ قواعد جدار حماية تطبيقات الويب (WAF) لحظر طلبات POST لنقاط نهاية ملف تعريف المستخدم من حسابات المشترك
- تفعيل المصادقة متعددة العوامل (2FA) لجميع الحسابات الإدارية
- تنفيذ القائمة البيضاء لعناوين IP لوصول لوحة إدارة WordPress
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.9.2.1 - User access management and authentication ECC 2024 A.9.4.3 - Password management and change procedures ECC 2024 A.12.4.1 - Event logging and monitoring ECC 2024 A.14.2.1 - Secure development and change management
🔵 SAMA CSF
SAMA CSF ID.AM-1 - Asset management and inventory SAMA CSF PR.AC-1 - Access control and authentication SAMA CSF DE.CM-1 - Detection and monitoring SAMA CSF RS.MI-2 - Incident response and mitigation
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 - Access control ISO 27001:2022 A.5.16 - Authentication ISO 27001:2022 A.8.3 - Logging and monitoring ISO 27001:2022 A.8.32 - Change management
🟣 PCI DSS v4.0
PCI DSS 2.1 - Default security parameters PCI DSS 6.2 - Security patches and updates PCI DSS 7.1 - Access control and least privilege PCI DSS 10.2 - User access logging and monitoring
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-639
EPSS0.04%
Exploit No
Patch ✓ Yes
Published 2026-02-11
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-639
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.