LC Wizard WordPress Plugin CVE-2025-5483 Privilege Escalation: Brief Summary and Technical Details

A brief summary of CVE-2025-5483 impacting the LC Wizard (Connector Wizard) WordPress plugin. This post covers technical details, affected versions, and vendor security history based on available public sources.
CVE Analysis

7 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-11-06

LC Wizard WordPress Plugin CVE-2025-5483 Privilege Escalation: Brief Summary and Technical Details
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Attackers can gain full administrative control over WordPress sites running specific versions of the LC Wizard (Connector Wizard) plugin, simply by sending unauthenticated HTTP requests when PRO features are enabled. This vulnerability exposes affected sites to immediate takeover and persistent compromise, especially for organizations relying on WordPress as a business platform.

LC Wizard (now Connector Wizard) is a WordPress plugin designed to integrate WordPress with the HighLevel/LeadConnector CRM. While not as widely recognized as core WordPress components, it serves a niche but important role for agencies and businesses leveraging CRM-driven workflows. The plugin is distributed via the official WordPress.org repository and has a history of recurring security issues, making its vulnerabilities particularly relevant for security teams managing CRM-integrated WordPress deployments.

Technical Information

CVE-2025-5483 is a privilege escalation vulnerability classified under CWE-862 (Missing Authorization). The root cause is a missing capability check in the ghl-wizard/inc/wp_user.php file. When the plugin's PRO functionality is enabled, it exposes an endpoint that allows user account creation without verifying the requester's permissions. As a result, unauthenticated attackers can craft HTTP requests to this endpoint, specifying parameters that result in the creation of new WordPress administrator accounts.

No authentication or prior access is required. The attack complexity is low: any actor with network access to the target site can exploit the flaw using basic HTTP tools. The vulnerability is confirmed in public advisories, but no public code snippet is available for the affected logic. The flaw only manifests when PRO features are enabled, which is a configuration-dependent risk factor.

Affected Systems and Versions

  • Product: LC Wizard (Connector Wizard) WordPress plugin
  • Vulnerable versions: 1.2.10 through 1.3.0
  • Vulnerability is only present when PRO functionality is enabled

Vendor Security History

The LC Wizard/Connector Wizard plugin has a documented history of security vulnerabilities:

  • CVE-2025-58237: Stored Cross-Site Scripting in versions through 1.4.1 (requires contributor access)
  • Multiple input validation and authorization issues in recent versions
  • Security updates have been released for previous vulnerabilities, but recurring issues suggest ongoing challenges with secure development practices

References

Detect & fix
what others miss