vulnerability
WordPress Plugin: emails-catch-all: CVE-2025-60041: Exposure of Sensitive Information to an Unauthorized Actor
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:C) | Oct 11, 2025 | Oct 24, 2025 | Oct 24, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:C)
Published
Oct 11, 2025
Added
Oct 24, 2025
Modified
Oct 24, 2025
Description
The Emails Catch All plugin for WordPress is vulnerable to privilege escalation via email log exposure in all versions up to, and including, 3.5.3. This is due to the plugin not properly restricting access to email logs. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger a password reset email that gets logged for all users, including administrators, and leverage that to reset the user's password and gain access to their account.
Solution
emails-catch-all-plugin-cve-2025-60041
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.