vulnerability
WordPress Plugin: checkout-mestres-wp: CVE-2023-51472: Weak Password Recovery Mechanism for Forgotten Password
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Dec 27, 2023 | May 15, 2025 | May 15, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 27, 2023
Added
May 15, 2025
Modified
May 15, 2025
Description
The Checkout Mestres WP plugin for WordPress is vulnerable to authentication due to a weak password reset functionality in all versions up to, and including, 7.1.9.6. This makes it possible for unauthenticated attackers to reset the password of arbitrary users to a guessable value based on the current time.
Solution
checkout-mestres-wp-plugin-cve-2023-51472

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.