Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10742: CWE-639 Authorization Bypass Through User-Controlled Key in dreamstechnologies Truelysell Core

0
Critical
VulnerabilityCVE-2025-10742cvecve-2025-10742cwe-639
Published: Thu Oct 16 2025 (10/16/2025, 06:47:29 UTC)
Source: CVE Database V5
Vendor/Project: dreamstechnologies
Product: Truelysell Core

Description

The Truelysell Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.8.6. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited unauthenticated if the attacker knows which page contains the 'truelysell_edit_staff' shortcode.

AI-Powered Analysis

AILast updated: 10/16/2025, 07:16:24 UTC

Technical Analysis

CVE-2025-10742 is a critical security vulnerability identified in the Truelysell Core plugin for WordPress, affecting all versions up to and including 1.8.6. The root cause is an authorization bypass (CWE-639) where the plugin improperly allows user-controlled access to internal objects. Specifically, the vulnerability enables an unauthenticated attacker who knows the location of the 'truelysell_edit_staff' shortcode page to arbitrarily change user passwords, including those of administrators. This is possible because the plugin fails to enforce proper authorization checks before processing password change requests, effectively allowing attackers to escalate privileges and take over accounts without any authentication or user interaction. The CVSS 3.1 base score is 9.8, reflecting the vulnerability's ease of exploitation (network vector, no privileges required, no user interaction) and its severe impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the high severity and straightforward exploitation method make this a critical threat. The vulnerability affects WordPress sites using the Truelysell Core plugin, which is commonly used for e-commerce and digital service management. The lack of available patches at the time of disclosure necessitates immediate defensive actions to mitigate risk.

Potential Impact

For European organizations, this vulnerability presents a significant risk of unauthorized account takeover, particularly of administrator accounts, which can lead to full site compromise. Attackers exploiting this flaw can change passwords arbitrarily, potentially locking out legitimate users and gaining persistent control over the WordPress environment. This can result in data breaches, defacement, insertion of malicious content, or use of the site as a launchpad for further attacks within the network. Organizations relying on WordPress for e-commerce, customer management, or internal portals are at heightened risk of operational disruption and reputational damage. Given the criticality and ease of exploitation, the impact on confidentiality, integrity, and availability is severe. The threat is amplified in sectors with stringent data protection regulations like GDPR, where breaches can lead to substantial fines and legal consequences.

Mitigation Recommendations

Until an official patch is released, European organizations should take immediate steps to mitigate risk. These include restricting access to pages containing the 'truelysell_edit_staff' shortcode via web application firewalls (WAFs) or IP whitelisting to prevent unauthorized access. Implement monitoring and alerting for unusual password change activities, especially for administrator accounts. Employ multi-factor authentication (MFA) on all WordPress accounts to reduce the impact of compromised credentials. Regularly audit user accounts and permissions to detect unauthorized changes. Consider temporarily disabling or removing the Truelysell Core plugin if feasible. Maintain up-to-date backups to enable recovery in case of compromise. Once a patch is available, prioritize prompt application and verify the fix through testing. Additionally, educate site administrators about this vulnerability and encourage vigilance against suspicious activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-19T18:39:16.715Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f0983c20d29eed058254aa

Added to database: 10/16/2025, 7:01:16 AM

Last enriched: 10/16/2025, 7:16:24 AM

Last updated: 10/16/2025, 11:20:36 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats