Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Thu, 16 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Oct 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Truelysell Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.8.6. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited unauthenticated if the attacker knows which page contains the 'truelysell_edit_staff' shortcode. | |
| Title | Truelysell Core <= 1.8.6 - Unauthenticated Arbitrary User Password Change | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:13:26.336Z
Reserved: 2025-09-19T18:39:16.715Z
Link: CVE-2025-10742
Updated: 2025-10-16T13:32:21.667Z
Status : Deferred
Published: 2025-10-16T07:15:32.517
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-10742
No data.
OpenCVE Enrichment
Updated: 2026-04-21T02:30:25Z