CVE-2025-13615
BaseFortify
Publication date: 2025-11-30
Last updated on: 2025-11-30
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | streamtube_core_plugin | 4.78 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the StreamTube Core plugin for WordPress allows an unauthenticated attacker to change user passwords arbitrarily. This happens because the plugin provides user-controlled access to objects, enabling bypass of authorization and access to system resources. This can lead to attackers taking over administrator accounts. Exploitation requires the 'registration password fields' option to be enabled in the theme settings.
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized password changes by attackers, potentially leading to full account takeover of administrator accounts. This compromises the security and integrity of the affected WordPress site, allowing attackers to control the site and access sensitive information or perform malicious actions.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately disable the 'registration password fields' option in the theme settings of the StreamTube Core plugin. Additionally, update the plugin to a version later than 4.78 once a patch is available. Monitor user accounts for unauthorized password changes and consider enforcing strong password policies and multi-factor authentication to reduce risk.