Description
The PSW Front-end Login & Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.12 via the customer_registration() function. This is due to the use of a weak, low-entropy OTP mechanism in the forget() function. This makes it possible for unauthenticated attackers to initiate a password reset for any user, including administrators, and elevate their privileges for full site takeover.
Problem types
CWE-330 Use of Insufficiently Random Values
Product status
* (semver)
Timeline
| 2025-05-30: | Disclosed |
Credits
Kenneth Dunn
References
www.wordfence.com/...-0682-4a41-a432-afbcb50144e8?source=cve
plugins.trac.wordpress.org/...sitegeneralfeatures-public.php
wordpress.org/plugins/psw-login-and-registration/
plugins.trac.wordpress.org/...sitegeneralfeatures-public.php
plugins.trac.wordpress.org/...sitegeneralfeatures-public.php
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.