We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4607

PSW Front-end Login & Registration <= 1.12 - Insufficiently Random Values to Unauthenticated Account Takeover/Privilege Escalation via customer_registration Function



Description

The PSW Front-end Login & Registration plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.12 via the customer_registration() function. This is due to the use of a weak, low-entropy OTP mechanism in the forget() function. This makes it possible for unauthenticated attackers to initiate a password reset for any user, including administrators, and elevate their privileges for full site takeover.

Reserved 2025-05-12 | Published 2025-05-31 | Updated 2025-06-02 | Assigner Wordfence


CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-330 Use of Insufficiently Random Values

Product status

Default status
unaffected

*
affected

Timeline

2025-05-30:Disclosed

Credits

Kenneth Dunn finder

References

www.wordfence.com/...-0682-4a41-a432-afbcb50144e8?source=cve

plugins.trac.wordpress.org/...sitegeneralfeatures-public.php

wordpress.org/plugins/psw-login-and-registration/

plugins.trac.wordpress.org/...sitegeneralfeatures-public.php

plugins.trac.wordpress.org/...sitegeneralfeatures-public.php

cve.org (CVE-2025-4607)

nvd.nist.gov (CVE-2025-4607)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4607

Support options

Helpdesk Chat, Email, Knowledgebase