Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14975: CWE-269 Improper Privilege Management in Custom Login Page Customizer

0
Unknown
VulnerabilityCVE-2025-14975cvecve-2025-14975cwe-269
Published: Thu Jan 29 2026 (01/29/2026, 06:00:02 UTC)
Source: CVE Database V5
Product: Custom Login Page Customizer

Description

The Custom Login Page Customizer WordPress plugin before 2.5.4 does not have a proper password reset process, allowing a few unauthenticated requests to reset the password of any user by knowing their username, such as administrator ones, and therefore gain access to their account

AI-Powered Analysis

AILast updated: 01/29/2026, 06:35:17 UTC

Technical Analysis

CVE-2025-14975 is a vulnerability classified under CWE-269 (Improper Privilege Management) found in the Custom Login Page Customizer WordPress plugin prior to version 2.5.4. The core issue is an insecure password reset mechanism that does not properly authenticate or verify the identity of the requester. An attacker can send a limited number of unauthenticated requests containing only a valid username to trigger a password reset for that user account. This includes high-privilege accounts such as administrators. Because the plugin fails to enforce proper controls during the reset process, the attacker can effectively reset the password without any prior authentication or user interaction. This vulnerability allows unauthorized access to WordPress accounts, which can lead to full administrative control over the affected website. The vulnerability was reserved in December 2025 and published in January 2026, with no CVSS score assigned and no known exploits detected in the wild at the time of reporting. The affected versions include 2.1.1 and presumably other versions before 2.5.4, which contains the fix. The vulnerability is critical in WordPress environments where this plugin is used, as it undermines the fundamental security of user authentication and access control.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for those relying on WordPress websites for business operations, e-commerce, or public-facing services. Unauthorized password resets can lead to account takeover, data breaches, defacement, or insertion of malicious content. The compromise of administrator accounts can result in full site control, enabling attackers to manipulate website content, steal sensitive data, or use the site as a launchpad for further attacks. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR violations), and cause financial losses. The impact is especially critical for sectors such as government, finance, healthcare, and retail, where website integrity and data confidentiality are paramount. Since the exploit requires no authentication and minimal user interaction, the attack surface is broad, increasing the likelihood of exploitation if the vulnerable plugin is in use.

Mitigation Recommendations

1. Immediately update the Custom Login Page Customizer plugin to version 2.5.4 or later once the patch is available to ensure the password reset process is secured. 2. Until the patch is applied, disable or restrict access to the password reset functionality provided by the plugin, possibly by blocking related endpoints via web application firewalls (WAFs) or server rules. 3. Monitor logs for unusual password reset requests, especially those targeting administrator accounts, and implement alerting for suspicious activity. 4. Enforce multi-factor authentication (MFA) for all WordPress administrator accounts to reduce the risk of account takeover even if passwords are reset. 5. Regularly audit installed plugins and remove or replace those that are outdated or no longer maintained. 6. Employ security plugins that provide enhanced login security and anomaly detection. 7. Educate site administrators on recognizing phishing or social engineering attempts that might accompany exploitation attempts. 8. Conduct periodic security assessments and penetration testing focused on authentication mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-19T15:21:10.709Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697afc494623b1157c712eb5

Added to database: 1/29/2026, 6:20:57 AM

Last enriched: 1/29/2026, 6:35:17 AM

Last updated: 1/29/2026, 9:06:14 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats