The Reales WP STPT plugin for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 2.1.2. This is due to the 'reales_user_signup_form' AJAX action not verifying if user registration is enabled, prior to registering a user. This makes it possible for unauthenticated attackers to create new user accounts, which can be leveraged with CVE-XX to achieve privilege escalation.
History

Tue, 06 May 2025 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 06 May 2025 02:30:00 +0000

Type Values Removed Values Added
Description The Reales WP STPT plugin for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 2.1.2. This is due to the 'reales_user_signup_form' AJAX action not verifying if user registration is enabled, prior to registering a user. This makes it possible for unauthenticated attackers to create new user accounts, which can be leveraged with CVE-XX to achieve privilege escalation.
Title Reales WP STPT <= 2.1.2 - Unauthorized User Registration
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-05-06T01:42:44.208Z

Updated: 2025-05-06T02:36:28.381Z

Reserved: 2025-04-14T20:16:57.211Z

Link: CVE-2025-3609

cve-icon Vulnrichment

Updated: 2025-05-06T02:36:24.874Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-06T03:15:17.620

Modified: 2025-05-07T14:13:35.980

Link: CVE-2025-3609

cve-icon Redhat

No data.