CVE-2025-10742
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-16

Last updated on: 2025-10-16

Assigner: Wordfence

Description
The Truelysell Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.8.6. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited unauthenticated if the attacker knows which page contains the 'truelysell_edit_staff' shortcode.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-16
Last Modified
2025-10-16
Generated
2026-05-07
AI Q&A
2025-10-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
truelysell core_plugin 1.8.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Truelysell Core plugin for WordPress up to version 1.8.6 has a vulnerability that allows an attacker to change user passwords without authorization. This happens because the plugin lets users control access to certain objects, enabling bypass of authorization checks. An unauthenticated attacker who knows the page containing the 'truelysell_edit_staff' shortcode can exploit this to change passwords and potentially take over administrator accounts.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to change any user's password, including administrators, without needing to log in. This could lead to unauthorized access, full account takeover, data theft, site defacement, or other malicious activities on the affected WordPress site.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart