CVE-2025-2470 Overview
The Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, contains a critical privilege escalation vulnerability. This security flaw exists in all versions up to and including version 5.1 and stems from a lack of restriction on user role assignment in the nsl_registration_store_extra_input function. The vulnerability allows unauthenticated attackers to register accounts with arbitrary roles, including Administrator privileges, when registering via social login functionality.
Critical Impact
Unauthenticated attackers can gain full Administrator access to affected WordPress sites by exploiting the social login registration flow, potentially leading to complete site compromise.
Affected Products
- Service Finder Bookings plugin for WordPress (versions up to and including 5.1)
- Service Finder - Directory and Job Board WordPress Theme
- Sites with Nextend Social Login plugin installed and configured
Discovery Timeline
- April 25, 2025 - CVE CVE-2025-2470 published to NVD
- April 29, 2025 - Last updated in NVD database
Technical Details for CVE-2025-2470
Vulnerability Analysis
This privilege escalation vulnerability (CWE-266: Incorrect Privilege Assignment) occurs due to improper access control during the user registration process when social login is utilized. The nsl_registration_store_extra_input function fails to validate or restrict the user role parameter during registration, allowing attackers to specify any WordPress role during account creation.
The attack requires the Nextend Social Login plugin to be installed and configured alongside the Service Finder Bookings plugin. When both conditions are met, the registration handler accepts user-supplied role values without proper authorization checks, enabling an unauthenticated attacker to create an administrator account.
Root Cause
The vulnerability originates from missing authorization checks in the nsl_registration_store_extra_input function. The function processes user registration data from the Nextend Social Login integration but does not implement proper role validation or restriction. This allows user-controlled input to directly influence the assigned WordPress role during account creation, bypassing the expected privilege model where new users should receive limited default roles.
Attack Vector
The attack is network-based and requires no authentication or user interaction. An attacker can exploit this vulnerability by initiating a social login registration flow and manipulating the role parameter to specify "administrator" or any other privileged role. The exploitation chain involves:
- Identifying a WordPress site using the Service Finder Bookings plugin with Nextend Social Login enabled
- Initiating the social login registration process
- Intercepting and modifying the registration request to include an elevated role assignment
- Completing the registration to receive an administrator account
The vulnerability allows complete site takeover since WordPress administrators have full control over all site functionality, including the ability to install plugins, modify themes, access sensitive data, and execute arbitrary code.
Detection Methods for CVE-2025-2470
Indicators of Compromise
- Unexpected administrator or privileged user accounts appearing in WordPress user lists
- New user registrations with administrative roles that originated from social login sources
- Unusual social login activity patterns in authentication logs
- Modifications to site settings, plugins, or themes by unfamiliar accounts
Detection Strategies
- Monitor WordPress user registration logs for accounts created with elevated privileges via social login
- Implement alerting for any new administrator account creation events
- Review wp_users and wp_usermeta tables for accounts with unexpected wp_capabilities containing administrator roles
- Enable and monitor WordPress audit logging for privilege changes and user creation events
Monitoring Recommendations
- Deploy web application firewall (WAF) rules to inspect registration requests for role manipulation attempts
- Implement real-time monitoring of WordPress user creation events with privilege alerts
- Regularly audit user accounts and their assigned roles for anomalies
- Monitor plugin interaction logs between Service Finder Bookings and Nextend Social Login
How to Mitigate CVE-2025-2470
Immediate Actions Required
- Update the Service Finder Bookings plugin to a patched version when available
- Temporarily disable social login registration functionality until patches are applied
- Audit existing user accounts for any unauthorized administrator accounts created via social login
- Remove or suspend any suspicious accounts with elevated privileges
Patch Information
Users should check for updates from the plugin vendor. For technical details and vulnerability information, refer to the Wordfence Vulnerability Report and the ThemeForest Product Listing for official updates and patch releases.
Workarounds
- Disable the Nextend Social Login integration with Service Finder Bookings until a patch is available
- Implement server-level restrictions to filter registration requests containing role parameters
- Use a security plugin to enforce role restrictions during user registration
- Consider temporarily disabling new user registration via social login mechanisms
If patching is not immediately possible, administrators should implement role validation at the application level by adding custom code to enforce role restrictions during social login registration, or utilize WordPress security plugins that provide registration controls.
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


