We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4473

Frontend Dashboard 1.5.10 - 2.2.7 - Missing Authorization to Authenticated (Subscriber+) Account Takeover/Privilege Escalation via ajax_request Function



Description

The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ajax_request() function in versions 1.0 to 2.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to control where the plugin sends outgoing emails. By pointing SMTP to their own server, attackers could capture password reset emails intended for administrators, and elevate their privileges for full site takeover.

Reserved 2025-05-08 | Published 2025-05-13 | Updated 2025-05-13 | Assigner Wordfence


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-285 Improper Authorization

Product status

Default status
unaffected

1.5.10
affected

Timeline

2025-05-12:Disclosed

Credits

Kenneth Dunn finder

References

www.wordfence.com/...-b024-4b3f-af67-b7fcb997d368?source=cve

plugins.trac.wordpress.org/....7/route/class-fed-request.php

wordpress.org/plugins/frontend-dashboard/

plugins.trac.wordpress.org/...ludes/admin/function-admin.php

plugins.trac.wordpress.org/..._tab/email/class-fed-email.php

plugins.trac.wordpress.org/changeset/3290623/

cve.org (CVE-2025-4473)

nvd.nist.gov (CVE-2025-4473)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4473

Support options

Helpdesk Chat, Email, Knowledgebase