9.8
CVE-2025-6688
- EPSS 0.44%
- Veröffentlicht 27.06.2025 07:22:23
- Zuletzt bearbeitet 02.07.2025 17:49:42
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Simple Payment 1.3.6 - 2.3.8 - Authentication Bypass to Admin
The Simple Payment plugin for WordPress is vulnerable to Authentication Bypass in versions 1.3.6 to 2.3.8. This is due to the plugin not properly verifying a user's identity prior to logging them in through the create_user() function. This makes it possible for unauthenticated attackers to log in as administrative users.
Mögliche Gegenmaßnahme
Simple Payment: Update to version 2.3.9, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Simple Payment
Version
1.3.6-2.3.8
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Idokd ≫ Simple Payment SwPlatformwordpress Version >= 1.3.6 < 2.3.9
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.44% | 0.627 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.