The Resideo Plugin for Resideo - Real Estate WordPress Theme plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.5.4. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
History

Fri, 12 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Pixel Prime
Pixel Prime resideo Plugin
Wordpress
Wordpress wordpress
Vendors & Products Pixel Prime
Pixel Prime resideo Plugin
Wordpress
Wordpress wordpress

Wed, 10 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Sep 2025 12:45:00 +0000

Type Values Removed Values Added
Description The Resideo Plugin for Resideo - Real Estate WordPress Theme plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.5.4. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
Title Resideo Plugin for Resideo - Real Estate WordPress Theme <= 2.5.4 - Authenticated (Subscriber+) Insecure Direct Object Reference to Privilege Escalation via Account Takeover
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-09-10T12:25:30.026Z

Updated: 2025-09-10T14:06:50.678Z

Reserved: 2025-07-16T14:56:48.330Z

Link: CVE-2025-7718

cve-icon Vulnrichment

Updated: 2025-09-10T14:06:41.174Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-10T13:15:37.040

Modified: 2025-09-11T17:14:10.147

Link: CVE-2025-7718

cve-icon Redhat

No data.