Cyber Posture

CVE-2025-10742

Critical

Published: 16 October 2025

Published
16 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0028 51.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.

Security Summary

CVE-2025-10742 is an authorization bypass vulnerability in the Truelysell Core plugin for WordPress, affecting versions up to and including 1.8.6. It enables arbitrary user password changes due to the plugin providing user-controlled access to objects, allowing attackers to bypass authorization checks and access system resources. The issue is classified under CWE-639 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with network accessibility, low complexity, and no privileges required.

Unauthenticated attackers can exploit this vulnerability if they know the specific page containing the 'truelysell_edit_staff' shortcode. Successful exploitation allows them to change passwords of any user, including administrators, potentially leading to full account takeover and unauthorized control over the WordPress site.

Advisories and further details, including potential mitigation guidance, are available from Wordfence threat intelligence and the Truelysell theme page on ThemeForest.

Details

CWE(s)
CWE-639

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1098 Account Manipulation Persistence
Adversaries may manipulate accounts to maintain and/or elevate access to victim systems.
Why these techniques?

T1190 directly matches exploitation of a public-facing WordPress plugin vulnerability. T1098 is facilitated by the ability to arbitrarily change any user password, enabling account manipulation and takeover.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References