Description
The Dataverse Integration plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks within its reset_password_link REST endpoint in versions 2.77 through 2.81. The endpoint’s handler accepts a client-supplied id, email, or login, looks up that user, and calls get_password_reset_key() unconditionally. Because it only checks that the caller is authenticated, and not that they own or may edit the target account, any authenticated attacker, with Subscriber-level access and above, can obtain a password reset link for an administrator and hijack that account.
Problem types
Product status
2.77 (semver)
Timeline
| 2025-07-16: | Vendor Notified |
| 2025-07-23: | Disclosed |
Credits
Kenneth Dunn
References
www.wordfence.com/...-7203-4832-8b0d-56f3e7983118?source=cve
wordpress.org/plugins/integration-cds/
plugins.trac.wordpress.org/.../API/AuthenticatedEndpoint.php
plugins.trac.wordpress.org/...s/GetResetUserPasswordLink.php
plugins.trac.wordpress.org/...3579%40integration-cds%2Ftrunk