CVE-2025-5931
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-26

Last updated on: 2025-08-26

Assigner: Wordfence

Description
The Dokan Pro plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.5. This is due to the plugin not properly validating a user's identity prior to updating their password during a staff password reset. This makes it possible for authenticated attackers, with vendor-level access and above, to elevate their privilege to the level of a staff member and then change arbitrary user passwords, including those of administrators in order to gain access to their accounts. By default, the plugin allows customers to become vendors.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-26
Last Modified
2025-08-26
Generated
2026-05-07
AI Q&A
2025-08-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dokan dokan_pro *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Dokan Pro plugin for WordPress allows an authenticated attacker with vendor-level access or higher to escalate their privileges by taking over accounts. This happens because the plugin does not properly verify a user's identity before allowing a password reset for staff members. As a result, the attacker can change passwords of arbitrary users, including administrators, thereby gaining unauthorized access to their accounts.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized privilege escalation, allowing attackers to gain access to staff or administrator accounts. This can result in loss of control over the WordPress site, unauthorized changes, data breaches, and potential further exploitation of the system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the Dokan Pro plugin to a version later than 4.0.5 where the issue is fixed. Additionally, review and restrict vendor-level access permissions to trusted users only, and monitor for any unauthorized password changes, especially for staff and administrator accounts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart