The PSW Front-end Login & Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.12 via the customer_registration() function. This is due to the use of a weak, low-entropy OTP mechanism in the forget() function. This makes it possible for unauthenticated attackers to initiate a password reset for any user, including administrators, and elevate their privileges for full site takeover.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Jun 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 31 May 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The PSW Front-end Login & Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.12 via the customer_registration() function. This is due to the use of a weak, low-entropy OTP mechanism in the forget() function. This makes it possible for unauthenticated attackers to initiate a password reset for any user, including administrators, and elevate their privileges for full site takeover. | |
Title | PSW Front-end Login & Registration <= 1.12 - Insufficiently Random Values to Unauthenticated Account Takeover/Privilege Escalation via customer_registration Function | |
Weaknesses | CWE-330 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-31T06:40:56.485Z
Updated: 2025-06-02T15:49:31.883Z
Reserved: 2025-05-12T19:29:25.486Z
Link: CVE-2025-4607

Updated: 2025-06-02T15:18:11.863Z

Status : Awaiting Analysis
Published: 2025-05-31T07:15:21.070
Modified: 2025-06-02T17:32:17.397
Link: CVE-2025-4607

No data.