9.8

CVE-2025-6688

Simple Payment 1.3.6 - 2.3.8 - Authentication Bypass to Admin

The Simple Payment plugin for WordPress is vulnerable to Authentication Bypass in versions 1.3.6 to 2.3.8. This is due to the plugin not properly verifying a user's identity prior to logging them in through the create_user() function. This makes it possible for unauthenticated attackers to log in as administrative users.
Mögliche Gegenmaßnahme
Simple Payment: Update to version 2.3.9, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Simple Payment
Version 1.3.6-2.3.8
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IdokdSimple Payment SwPlatformwordpress Version >= 1.3.6 < 2.3.9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.44% 0.627
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security@wordfence.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-288 Authentication Bypass Using an Alternate Path or Channel

The product requires authentication, but the product has an alternate path or channel that does not require authentication.