The Dataverse Integration plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks within its reset_password_link REST endpoint in versions 2.77 through 2.81. The endpoint’s handler accepts a client-supplied id, email, or login, looks up that user, and calls get_password_reset_key() unconditionally. Because it only checks that the caller is authenticated, and not that they own or may edit the target account, any authenticated attacker, with Subscriber-level access and above, can obtain a password reset link for an administrator and hijack that account.
References
Configurations
No configuration.
History
24 Jul 2025, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-24 10:15
Updated : 2025-07-25 15:29
NVD link : CVE-2025-7695
Mitre link : CVE-2025-7695
CVE.ORG link : CVE-2025-7695
JSON object : View
Products Affected
No product.
CWE
CWE-862
Missing Authorization