The Simple Payment plugin for WordPress is vulnerable to Authentication Bypass in versions 1.3.6 to 2.3.8. This is due to the plugin not properly verifying a user's identity prior to logging them in through the create_user() function. This makes it possible for unauthenticated attackers to log in as administrative users.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 27 Jun 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Simple Payment plugin for WordPress is vulnerable to Authentication Bypass in versions 1.3.6 to 2.3.8. This is due to the plugin not properly verifying a user's identity prior to logging them in through the create_user() function. This makes it possible for unauthenticated attackers to log in as administrative users. | |
Title | Simple Payment 1.3.6 - 2.3.8 - Authentication Bypass to Admin | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-06-27T07:22:23.675Z
Updated: 2025-06-27T13:40:48.222Z
Reserved: 2025-06-25T21:40:55.258Z
Link: CVE-2025-6688

Updated: 2025-06-27T13:40:38.579Z

Status : Awaiting Analysis
Published: 2025-06-27T08:15:23.243
Modified: 2025-06-30T18:38:48.477
Link: CVE-2025-6688

No data.