We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-7695

Dataverse Integration 2.77 - 2.81 - Missing Authorization to Authenticated (Subscriber+) Privilege Escalation via reset_password_link REST Route



Description

The Dataverse Integration plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks within its reset_password_link REST endpoint in versions 2.77 through 2.81. The endpoint’s handler accepts a client-supplied id, email, or login, looks up that user, and calls get_password_reset_key() unconditionally. Because it only checks that the caller is authenticated, and not that they own or may edit the target account, any authenticated attacker, with Subscriber-level access and above, can obtain a password reset link for an administrator and hijack that account.

Reserved 2025-07-15 | Published 2025-07-24 | Updated 2025-07-24 | Assigner Wordfence


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

2.77
affected

Timeline

2025-07-16:Vendor Notified
2025-07-23:Disclosed

Credits

Kenneth Dunn finder

References

www.wordfence.com/...-7203-4832-8b0d-56f3e7983118?source=cve

wordpress.org/plugins/integration-cds/

plugins.trac.wordpress.org/.../API/AuthenticatedEndpoint.php

plugins.trac.wordpress.org/...s/GetResetUserPasswordLink.php

plugins.trac.wordpress.org/...3579%40integration-cds%2Ftrunk

cve.org (CVE-2025-7695)

nvd.nist.gov (CVE-2025-7695)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-7695

Support options

Helpdesk Chat, Email, Knowledgebase