Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5949: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings

0
High
VulnerabilityCVE-2025-5949cvecve-2025-5949cwe-639
Published: Sat Nov 01 2025 (11/01/2025, 04:27:42 UTC)
Source: CVE Database V5
Vendor/Project: aonetheme
Product: Service Finder Bookings

Description

The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's identity prior to processing a password change request. This makes it possible for authenticated attackers with subscriber access or higher to reset other users' passwords, including those of admins.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 15:45:03 UTC

Technical Analysis

CVE-2025-5949 is an authorization bypass vulnerability classified under CWE-639, found in the Service Finder Bookings plugin for WordPress developed by aonetheme. The vulnerability exists because the plugin fails to properly verify the identity of a user before processing password change requests. Specifically, authenticated users with subscriber privileges or higher can exploit this flaw to reset passwords of other users, including administrators, thereby escalating their privileges and potentially taking over accounts. The vulnerability affects all versions up to and including version 6.0. The CVSS v3.1 base score is 8.8, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker can fully compromise the targeted WordPress site by gaining administrative access. No patches or fixes are currently linked, and no known exploits have been observed in the wild as of the published date. The vulnerability was reserved in June 2025 and published in November 2025. The flaw stems from improper authorization checks, allowing user-controlled keys to bypass intended access controls during password reset operations.

Potential Impact

The impact of CVE-2025-5949 is severe for organizations using the Service Finder Bookings plugin on WordPress. Attackers with minimal privileges can escalate their access to administrator level by resetting passwords of higher-privileged accounts. This can lead to full site compromise, including data theft, defacement, insertion of malicious code, or disruption of services. Confidentiality is compromised as attackers gain access to sensitive user and organizational data. Integrity is at risk due to unauthorized changes to site content and configurations. Availability can be affected if attackers disrupt or disable the website. Given WordPress's widespread use globally, this vulnerability poses a significant risk to businesses, e-commerce platforms, and service providers relying on this plugin. The lack of user interaction and low attack complexity make exploitation feasible for a wide range of attackers, including insiders or automated bots. Organizations may face reputational damage, regulatory penalties, and operational disruptions if exploited.

Mitigation Recommendations

To mitigate CVE-2025-5949, organizations should immediately audit their WordPress installations for the presence of the Service Finder Bookings plugin and identify the version in use. Until an official patch is released, consider the following specific actions: 1) Restrict plugin access by limiting subscriber-level users from accessing password reset functionalities via custom role permissions or security plugins. 2) Implement Web Application Firewall (WAF) rules to detect and block suspicious password reset requests originating from authenticated users. 3) Monitor logs for unusual password reset activities, especially targeting administrator accounts. 4) Temporarily disable the plugin if it is not critical to operations or replace it with alternative booking solutions that do not have this vulnerability. 5) Enforce strong multi-factor authentication (MFA) for all administrator accounts to reduce the impact of potential account takeover. 6) Regularly update WordPress core and plugins once a patch is available from the vendor. 7) Educate users and administrators about the risk and signs of account compromise. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and temporary containment until a vendor fix is deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-06-09T18:27:58.059Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69058f8066e0c23159a8cd05

Added to database: 11/1/2025, 4:41:36 AM

Last enriched: 2/27/2026, 3:45:03 PM

Last updated: 3/23/2026, 5:58:03 AM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses