CVE-2025-5305
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-09-22
Assigner: WPScan
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | password_reset_with_code | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Password Reset with Code for WordPress REST API plugin versions before 0.0.17. The plugin does not use cryptographically secure algorithms to generate one-time passwords (OTP) codes, which are used for password resets. Because of this weakness, attackers may be able to predict or forge OTP codes, potentially allowing them to take over user accounts.
How can this vulnerability impact me? :
The vulnerability can lead to account takeovers by attackers who exploit the weak OTP generation. This means unauthorized users could reset passwords and gain access to accounts they do not own, compromising the security and privacy of affected users.