The WP Private Content Plus through 3.6.2 provides a global content protection feature that requires a password. However, the access control check is based only on the presence of an unprotected client-side cookie. As a result, an unauthenticated attacker can completely bypass the password protection by manually setting the cookie value in their browser.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 28 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Nimeshrmr
Nimeshrmr wp Private Content Plus
Wordpress
Wordpress wordpress
Vendors & Products Nimeshrmr
Nimeshrmr wp Private Content Plus
Wordpress
Wordpress wordpress

Mon, 13 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
Description The WP Private Content Plus through 3.6.2 provides a global content protection feature that requires a password. However, the access control check is based only on the presence of an unprotected client-side cookie. As a result, an unauthenticated attacker can completely bypass the password protection by manually setting the cookie value in their browser.
Title WP Private Content Plus <= 3.6.2 - Password Protection Bypass
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-10-28T20:35:31.151Z

Reserved: 2025-09-19T10:32:37.291Z

Link: CVE-2025-10720

cve-icon Vulnrichment

Updated: 2025-10-28T20:35:23.209Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-13T10:15:45.590

Modified: 2025-10-28T21:15:37.157

Link: CVE-2025-10720

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-21T13:10:48Z