CVE-2025-6574
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-01

Last updated on: 2025-11-04

Assigner: Wordfence

Description
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and excluding, 6.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-01
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordfence service_finder_bookings *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Service Finder Bookings plugin for WordPress allows authenticated users with subscriber-level access or higher to escalate their privileges by taking over other user accounts. This happens because the plugin does not properly verify a user's identity before allowing updates to sensitive details like email addresses. An attacker can change another user's email address, including administrators, then use that to reset the password and gain full access to the account.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to user accounts, including administrator accounts, on a WordPress site using the affected plugin. Attackers can escalate their privileges, potentially gaining full control over the site, which can result in data breaches, site defacement, or other malicious activities.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart