Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 04 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 04 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ce21
Ce21 ce21-suite Wordpress Wordpress wordpress |
|
| Vendors & Products |
Ce21
Ce21 ce21-suite Wordpress Wordpress wordpress |
Tue, 04 Nov 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The CE21 Suite plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the wp_ajax_nopriv_ce21_single_sign_on_save_api_settings AJAX action in versions 2.2.1 to 2.3.1. This makes it possible for unauthenticated attackers to update the plugin's API settings including a secret key used for authentication. This allows unauthenticated attackers to create new admin accounts on an affected site. | |
| Title | CE21 Suite 2.2.1 - 2.3.1 - Missing Authorization to Unauthenticated Privilege Escalation via Plugin Settings Update | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-11-04T18:49:41.405Z
Reserved: 2025-09-25T20:54:07.094Z
Link: CVE-2025-11007
Updated: 2025-11-04T18:49:38.095Z
Status : Deferred
Published: 2025-11-04T04:15:36.903
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11007
No data.
OpenCVE Enrichment
Updated: 2025-11-04T16:33:26Z