CVE-2025-5949: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's identity prior to processing a password change request. This makes it possible for authenticated attackers with subscriber access or higher to reset other users' passwords, including those of admins.
AI Analysis
Technical Summary
CVE-2025-5949 is a critical authorization bypass vulnerability classified under CWE-639, affecting the Service Finder Bookings plugin for WordPress developed by aonetheme. The flaw arises because the plugin fails to properly verify the identity of users when processing password change requests. Specifically, any authenticated user with subscriber-level privileges or higher can exploit this weakness to reset the passwords of other users, including administrators, thereby escalating their privileges and potentially taking over accounts. This vulnerability does not require user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact on confidentiality, integrity, and availability is high, as attackers can gain full control over affected WordPress sites, manipulate data, and disrupt services. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. The plugin affects all versions up to and including 6.0, and no official patches were listed at the time of publication, necessitating urgent attention from site administrators. The vulnerability was reserved in June 2025 and published in November 2025, with Wordfence as the assigner. Given WordPress's widespread use in Europe, especially among small and medium enterprises, this vulnerability poses a substantial risk to organizations relying on the Service Finder Bookings plugin for appointment and booking management.
Potential Impact
For European organizations, the impact of CVE-2025-5949 is substantial. Organizations using the vulnerable plugin risk unauthorized privilege escalation, leading to full account takeover of administrative users. This can result in unauthorized access to sensitive data, defacement or disruption of websites, and potential lateral movement within the network if the WordPress site is integrated with internal systems. The confidentiality of customer and business data is at risk, as attackers can manipulate or exfiltrate information. Integrity is compromised as attackers can alter site content or configurations. Availability may be affected if attackers disrupt services or lock out legitimate administrators. Given the plugin's role in managing bookings and service appointments, exploitation could also disrupt business operations and customer trust. The threat is particularly critical for sectors relying heavily on online booking systems, such as healthcare, legal, education, and professional services prevalent across Europe. Additionally, regulatory compliance risks arise under GDPR if personal data is compromised due to this vulnerability.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the Service Finder Bookings plugin to trusted users only and auditing current user roles to minimize subscriber-level accounts. Administrators should monitor logs for unusual password reset activities and implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account takeover. Until an official patch is released, consider disabling the password reset functionality within the plugin or temporarily deactivating the plugin if feasible. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious password reset requests targeting this vulnerability. Regularly update WordPress core and all plugins to the latest versions once patches become available. Conduct thorough user permission reviews and enforce the principle of least privilege. Additionally, organizations should prepare incident response plans specific to WordPress compromises and educate users about the risks associated with password resets and account security.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-5949: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
Description
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's identity prior to processing a password change request. This makes it possible for authenticated attackers with subscriber access or higher to reset other users' passwords, including those of admins.
AI-Powered Analysis
Technical Analysis
CVE-2025-5949 is a critical authorization bypass vulnerability classified under CWE-639, affecting the Service Finder Bookings plugin for WordPress developed by aonetheme. The flaw arises because the plugin fails to properly verify the identity of users when processing password change requests. Specifically, any authenticated user with subscriber-level privileges or higher can exploit this weakness to reset the passwords of other users, including administrators, thereby escalating their privileges and potentially taking over accounts. This vulnerability does not require user interaction and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact on confidentiality, integrity, and availability is high, as attackers can gain full control over affected WordPress sites, manipulate data, and disrupt services. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. The plugin affects all versions up to and including 6.0, and no official patches were listed at the time of publication, necessitating urgent attention from site administrators. The vulnerability was reserved in June 2025 and published in November 2025, with Wordfence as the assigner. Given WordPress's widespread use in Europe, especially among small and medium enterprises, this vulnerability poses a substantial risk to organizations relying on the Service Finder Bookings plugin for appointment and booking management.
Potential Impact
For European organizations, the impact of CVE-2025-5949 is substantial. Organizations using the vulnerable plugin risk unauthorized privilege escalation, leading to full account takeover of administrative users. This can result in unauthorized access to sensitive data, defacement or disruption of websites, and potential lateral movement within the network if the WordPress site is integrated with internal systems. The confidentiality of customer and business data is at risk, as attackers can manipulate or exfiltrate information. Integrity is compromised as attackers can alter site content or configurations. Availability may be affected if attackers disrupt services or lock out legitimate administrators. Given the plugin's role in managing bookings and service appointments, exploitation could also disrupt business operations and customer trust. The threat is particularly critical for sectors relying heavily on online booking systems, such as healthcare, legal, education, and professional services prevalent across Europe. Additionally, regulatory compliance risks arise under GDPR if personal data is compromised due to this vulnerability.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the Service Finder Bookings plugin to trusted users only and auditing current user roles to minimize subscriber-level accounts. Administrators should monitor logs for unusual password reset activities and implement multi-factor authentication (MFA) for all administrative accounts to reduce the risk of account takeover. Until an official patch is released, consider disabling the password reset functionality within the plugin or temporarily deactivating the plugin if feasible. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious password reset requests targeting this vulnerability. Regularly update WordPress core and all plugins to the latest versions once patches become available. Conduct thorough user permission reviews and enforce the principle of least privilege. Additionally, organizations should prepare incident response plans specific to WordPress compromises and educate users about the risks associated with password resets and account security.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-09T18:27:58.059Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69058f8066e0c23159a8cd05
Added to database: 11/1/2025, 4:41:36 AM
Last enriched: 11/1/2025, 4:49:38 AM
Last updated: 11/1/2025, 1:26:17 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36367: CWE-862 Missing Authorization
HighCVE-2025-6990: CWE-94 Improper Control of Generation of Code ('Code Injection') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
HighCVE-2025-6988: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
MediumCVE-2025-6574: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
HighCVE-2025-12171: CWE-434 Unrestricted Upload of File with Dangerous Type in anthonyeden RESTful Content Syndication
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.