Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 27 Jun 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Iqonic
Iqonic wpbookit |
|
CPEs | cpe:2.3:a:iqonic:wpbookit:*:*:*:*:free:wordpress:*:* | |
Vendors & Products |
Iqonicdesign
Iqonicdesign wpbookit |
Iqonic
Iqonic wpbookit |
Wed, 21 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Iqonicdesign
Iqonicdesign wpbookit |
|
CPEs | cpe:2.3:a:iqonicdesign:wpbookit:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Iqonicdesign
Iqonicdesign wpbookit |
Fri, 09 May 2025 04:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 09 May 2025 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email through the edit_newdata_customer_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. | |
Title | WPBookit <= 1.0.2 - Insecure Direct Object Reference to Unauthenticated Privilege Escalation via Email Update | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-05-09T03:41:30.139Z
Reserved: 2025-04-18T18:14:29.105Z
Link: CVE-2025-3811

Updated: 2025-05-09T03:41:25.847Z

Status : Analyzed
Published: 2025-05-09T03:15:24.307
Modified: 2025-06-27T17:39:22.693
Link: CVE-2025-3811

No data.