Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Mon, 01 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 30 Nov 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The StreamTube Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 4.78. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited if the 'registration password fields' enabled in theme options. | |
| Title | StreamTube Core <= 4.78 - Unauthenticated Arbitrary User Password Change | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:17:43.665Z
Reserved: 2025-11-24T18:46:54.192Z
Link: CVE-2025-13615
Updated: 2025-12-01T13:31:37.058Z
Status : Deferred
Published: 2025-11-30T02:15:58.233
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-13615
No data.
OpenCVE Enrichment
Updated: 2026-04-21T18:00:11Z