A critical vulnerability has been discovered in the popular WordPress plugin Admin and Site Enhancements (ASE), which has more than 100,000 active installations and affects both the free and pro versions. This flaw allows users to escalate the privilege and gain previously held administrator roles even after being downgraded to a lower role.
Users are advised to update to version 7.6.3 immediately to mitigate the risk of privilege escalation attacks.
The vulnerability, tracked as CVE-2025-24648 and CVE-2024-43333, affects ASE versions 7.6.2.1 and below. It stems from a flaw in the ‘View Admin as Role’ feature, which temporarily allows users to switch to a different role for testing purposes. Due to broken logic in role switching, a downgraded user can regain their previous, more privileged role.
“For example, when a user is initially given an Administrator role and then the role is downgraded to a Subscriber role, the user, in this case, is able to recover their previous role, which is Administrator if the “View Admin as Role” feature is enabled on the plugin,” researchers reported. The issue is particularly concerning because it does not require administrative privileges to execute, making it an attractive target for potential attackers.

The flaw is linked to improper handling of user metadata stored in the ‘_asenha_view_admin_as_original_roles’ field. When an administrator switches roles, ASE saves their original role to this metadata. The exploit occurs when the attacker, leveraging the faulty permission checks, manipulates the system to reinstate their prior privileged role.
Additionally, the affected versions of ASE fail to enforce proper nonce validation and permission verification in role resets. As a result, even a non-administrative user could exploit the flaw to regain high-level access, posing a significant security risk.
The vendor has addressed this security flaw in version 7.6.3 by introducing a fix that deletes the stored ‘_asenha_view_admin_as_original_roles’ metadata whenever a user’s role is modified. This prevents unauthorised privilege restoration. The patch also improves security checks, properly validating role restoration actions.
Last month, two critical vulnerabilities were discovered in the RealEstate plugin, affecting 32,600 websites.
In the News: Israeli spyware maker confirms US government is a customer