Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3610: CWE-639 Authorization Bypass Through User-Controlled Key in pixel_prime Reales WP STPT

0
High
VulnerabilityCVE-2025-3610cvecve-2025-3610cwe-639
Published: Tue May 06 2025 (05/06/2025, 01:42:43 UTC)
Source: CVE
Vendor/Project: pixel_prime
Product: Reales WP STPT

Description

The Reales WP STPT plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.1.2. This is due to the plugin not properly validating a user's identity prior to updating their details like password. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's passwords and email addresses, including administrators, and leverage that to gain access to their account. This can be combined with CVE-2025-3609 to achieve remote code execution as an originally unauthenticated user with no account.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:38:48 UTC

Technical Analysis

CVE-2025-3610 is an authorization bypass vulnerability classified under CWE-639, affecting the Reales WP STPT plugin for WordPress. The core issue arises from the plugin's failure to properly validate a user's identity before allowing updates to sensitive account details such as passwords and email addresses. This flaw permits authenticated attackers with minimal privileges (subscriber-level or higher) to escalate their privileges by changing credentials of arbitrary users, including administrators. The vulnerability can be exploited without user interaction and requires only low privileges, making it highly accessible to attackers with any authenticated access. Furthermore, when combined with CVE-2025-3609, which presumably allows unauthenticated access, attackers can achieve remote code execution on the affected WordPress sites. The vulnerability affects all versions up to 2.1.2, and no official patches have been released at the time of publication. The CVSS 3.1 base score is 8.8, indicating a high severity with network attack vector, low attack complexity, and no user interaction required. The vulnerability impacts confidentiality, integrity, and availability, as attackers can fully compromise accounts and potentially the entire WordPress installation.

Potential Impact

The impact of CVE-2025-3610 is significant for organizations using the Reales WP STPT plugin. Attackers can escalate privileges from low-level subscriber accounts to administrator accounts by changing passwords and email addresses, effectively taking over high-privilege accounts. This compromises the confidentiality of sensitive data, the integrity of website content and user accounts, and the availability of the WordPress site if attackers deploy malicious code or lock out legitimate administrators. When combined with CVE-2025-3609, attackers can achieve remote code execution, allowing full system compromise, data theft, defacement, or use of the server for further attacks. This threat is particularly critical for organizations relying on WordPress for public-facing websites, e-commerce, or internal portals, as it can lead to severe reputational damage, financial loss, and regulatory penalties.

Mitigation Recommendations

To mitigate CVE-2025-3610, organizations should immediately restrict subscriber-level and other low-privilege user access to trusted individuals only and monitor account changes closely. Disable or uninstall the Reales WP STPT plugin if possible until a patch is released. Implement strict access controls and multi-factor authentication for administrator accounts to reduce the risk of takeover. Regularly audit user accounts for unauthorized changes to passwords and email addresses. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting user update functions. Keep WordPress core and all plugins updated, and subscribe to vendor advisories for patch releases. Additionally, segregate administrative functions and consider limiting plugin usage to environments where exposure is minimized. Incident response plans should be prepared to quickly respond to any signs of compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-14T20:19:19.334Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981cc4522896dcbdac84

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 2/27/2026, 1:38:48 PM

Last updated: 3/26/2026, 8:52:18 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses