CVE-2025-10742
Published: 16 October 2025
Summary
CVE-2025-10742 is a critical-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 48.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations to directly prevent authorization bypass via user-controlled access to objects allowing unauthenticated password changes.
Validates user-controlled inputs to prevent manipulation of object keys that bypass authorization checks in the plugin.
Manages information system accounts to protect against unauthorized modifications such as arbitrary password changes by attackers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
T1190 directly matches exploitation of a public-facing WordPress plugin vulnerability. T1098 is facilitated by the ability to arbitrarily change any user password, enabling account manipulation and takeover.
NVD Description
The Truelysell Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.8.6. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources.…
more
This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited unauthenticated if the attacker knows which page contains the 'truelysell_edit_staff' shortcode.
Deeper analysisAI
CVE-2025-10742 is an arbitrary user password change vulnerability in the Truelysell Core plugin for WordPress, affecting versions up to and including 1.8.6. The issue stems from the plugin providing user-controlled access to objects, which allows attackers to bypass authorization checks and access system resources. Published on 2025-10-16, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-639 (Authorization Bypass Through User-Controlled Key).
Unauthenticated attackers can exploit this vulnerability to change passwords of any user, including administrators, potentially enabling full account takeover. Successful exploitation requires the attacker to identify a page containing the 'truelysell_edit_staff' shortcode, after which they can directly manipulate user credentials without authentication.
Advisories and further details are provided by Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/a636e865-9556-4afb-8726-4537a160f379?source=cve and the plugin's ThemeForest listing at https://themeforest.net/item/truelysell-service-booking-wordpress-theme/43398124.
Details
- CWE(s)