The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like password and email through the edit_profile_data() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account.
Metrics
Affected Vendors & Products
References
History
Fri, 09 May 2025 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 09 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like password and email through the edit_profile_data() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account. | |
Title | WPBookit <= 1.0.2 - Insecure Direct Object Reference to Unauthenticated Privilege Escalation via Account Takeover | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-09T01:42:34.585Z
Updated: 2025-05-09T03:42:51.691Z
Reserved: 2025-04-18T18:08:49.740Z
Link: CVE-2025-3810

Updated: 2025-05-09T03:42:47.308Z

Status : Awaiting Analysis
Published: 2025-05-09T03:15:24.150
Modified: 2025-05-12T17:32:52.810
Link: CVE-2025-3810

No data.