CVE-2025-15001
Unknown Unknown - Not Provided
Privilege Escalation in FS Registration Password WordPress Plugin

Publication date: 2026-01-06

Last updated on: 2026-01-06

Assigner: Wordfence

Description
The FS Registration Password plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.1. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-06
Last Modified
2026-01-06
Generated
2026-05-07
AI Q&A
2026-01-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
unknown_vendor registration_password to 1.0.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15001 is a vulnerability in the FS Registration Password WordPress plugin (up to version 1.0.1) that allows unauthenticated attackers to escalate privileges by taking over user accounts. This happens because the plugin does not properly validate a user's identity before allowing a password update, enabling attackers to change any user's password, including administrators, and gain access to their accounts. [3]


How can this vulnerability impact me? :

This vulnerability can have a severe impact by allowing attackers to change passwords of arbitrary users without authentication. This can lead to unauthorized access to user accounts, including administrator accounts, resulting in full control over the affected WordPress site. The CVSS score of 9.8 indicates a critical risk with high confidentiality, integrity, and availability impacts.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can focus on identifying attempts to exploit the password update functionality without proper authentication. Since the vulnerability allows unauthenticated attackers to change arbitrary user passwords, monitoring HTTP POST requests to the password update endpoints of the FS Registration Password plugin for suspicious activity is recommended. Commands to detect such activity could include using web server logs or network monitoring tools to filter for POST requests containing parameters like 'pass1' and 'fs_is_password_for_registration'. For example, using grep on Apache logs: `grep 'POST' /var/log/apache2/access.log | grep 'fs_is_password_for_registration'` or using network monitoring tools like Wireshark or tcpdump to capture HTTP POST traffic targeting the WordPress site. Additionally, scanning the installed WordPress plugins to check if the vulnerable version (up to 1.0.1) of FS Registration Password is present can help detect exposure. [3]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the FS Registration Password plugin to version 2.0.1 or later, as this version includes security fixes that improve password validation and handling, addressing the vulnerability. If updating is not immediately possible, restrict access to the password update functionality by implementing additional authentication checks or disabling the plugin temporarily. Monitoring and alerting on suspicious password change attempts is also recommended until the update is applied. [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to change arbitrary user passwords, including administrators, leading to unauthorized access and potential data breaches. Such unauthorized access and data compromise can negatively impact compliance with standards like GDPR and HIPAA, which require protection of user data and access controls. However, specific compliance impacts are not detailed in the provided resources. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart