Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email

0
Critical
VulnerabilityCVE-2025-15018cvecve-2025-15018cwe-639
Published: Wed Jan 07 2026 (01/07/2026, 08:21:57 UTC)
Source: CVE Database V5
Vendor/Project: djanym
Product: Optional Email

Description

CVE-2025-15018 is a critical vulnerability in the Optional Email WordPress plugin by djanym, affecting all versions up to 1. 3. 11. It allows unauthenticated attackers to bypass authorization by manipulating the password reset process. The flaw arises because the plugin's 'random_password' filter is not limited to registration contexts, enabling attackers to set a known password reset key. This enables them to reset any user's password, including administrators, and take over their accounts without authentication or user interaction. The vulnerability has a CVSS score of 9. 8, indicating a critical risk with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at significant risk of account takeover and privilege escalation.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:38:22 UTC

Technical Analysis

CVE-2025-15018 is a critical authorization bypass vulnerability identified in the Optional Email plugin for WordPress, maintained by djanym. The vulnerability affects all versions up to and including 1.3.11. The root cause is the improper restriction of the 'random_password' filter, which is intended to be used only during user registration but is erroneously applied during password reset key generation. This flaw allows unauthenticated attackers to specify a known password reset key when initiating a password reset request. Consequently, attackers can reset the password of any user account, including those with administrative privileges, without needing any prior authentication or user interaction. This leads to full account takeover and privilege escalation on affected WordPress sites. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key) and has a CVSS v3.1 base score of 9.8, reflecting its critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no exploits have been reported in the wild yet, the vulnerability's nature makes it highly exploitable. The lack of patch links suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. This vulnerability threatens the confidentiality, integrity, and availability of affected WordPress sites, potentially allowing attackers to manipulate site content, steal sensitive data, or disrupt services.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those relying on WordPress sites with the Optional Email plugin installed. Successful exploitation can lead to unauthorized administrative access, enabling attackers to modify website content, inject malicious code, steal sensitive user data, or disrupt business operations. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), financial losses, and operational downtime. Given WordPress's widespread use across Europe for corporate websites, e-commerce platforms, and government portals, the impact could be extensive. Organizations in sectors such as finance, healthcare, government, and e-commerce are particularly vulnerable due to the sensitivity of their data and the critical nature of their web presence. The vulnerability's ease of exploitation without authentication or user interaction increases the likelihood of attacks, potentially leading to widespread compromise if not addressed promptly.

Mitigation Recommendations

1. Immediate action should be to monitor for updates or patches from the plugin vendor and apply them as soon as they become available. 2. Until a patch is released, disable or uninstall the Optional Email plugin if feasible to eliminate the attack surface. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious password reset requests that include user-controlled keys or abnormal parameters. 4. Enforce multi-factor authentication (MFA) on all WordPress administrator accounts to reduce the impact of compromised credentials. 5. Regularly audit user accounts and password reset logs for unusual activity indicative of exploitation attempts. 6. Restrict access to the WordPress admin panel by IP whitelisting or VPN access where possible. 7. Educate site administrators on the risks and signs of account takeover attacks. 8. Maintain regular backups of website data and configurations to enable quick recovery in case of compromise. 9. Consider deploying intrusion detection systems (IDS) to monitor for exploitation attempts targeting this vulnerability. These steps go beyond generic advice by focusing on compensating controls and proactive detection until an official patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-22T02:54:37.143Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b30a55ed4ed998cb6a3

Added to database: 1/7/2026, 8:37:04 AM

Last enriched: 1/14/2026, 3:38:22 PM

Last updated: 2/6/2026, 1:44:48 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats