CVE-2025-4973
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-12

Last updated on: 2025-07-10

Assigner: Wordfence

Description
The Workreap plugin for WordPress, used by the Workreap - Freelance Marketplace WordPress Theme, is vulnerable to authentication bypass in all versions up to, and including, 3.3.1. This is due to the plugin not properly verifying a user's identity prior to logging them in when verifying an account with an email address. This makes it possible for unauthenticated attackers to log in as registered users, including administrators, if they know user's email address. This is only exploitable fi the user's confirmation_key has not already been set by the plugin.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-12
Last Modified
2025-07-10
Generated
2026-05-07
AI Q&A
2025-06-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
amentotech workreap to 3.3.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Workreap plugin for WordPress (up to version 3.3.1) and allows an attacker to bypass authentication. The plugin fails to properly verify a user's identity before logging them in when verifying an account with an email address. As a result, an unauthenticated attacker who knows a registered user's email address can log in as that user, including administrators, if the user's confirmation_key has not yet been set.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows attackers to gain unauthorized access to user accounts, including administrator accounts. This can lead to full compromise of the WordPress site, allowing attackers to modify content, steal sensitive information, disrupt services, or perform other malicious actions with high privileges.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart