Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 04 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ce21
Ce21 ce21-suite Wordpress Wordpress wordpress |
|
| Vendors & Products |
Ce21
Ce21 ce21-suite Wordpress Wordpress wordpress |
Tue, 04 Nov 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The CE21 Suite plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the wp_ajax_nopriv_ce21_single_sign_on_save_api_settings AJAX action in versions 2.2.1 to 2.3.1. This makes it possible for unauthenticated attackers to update the plugin's API settings including a secret key used for authentication. This allows unauthenticated attackers to create new admin accounts on an affected site. | |
| Title | CE21 Suite 2.2.1 - 2.3.1 - Missing Authorization to Unauthenticated Privilege Escalation via Plugin Settings Update | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-11-04T18:49:41.405Z
Reserved: 2025-09-25T20:54:07.094Z
Link: CVE-2025-11007
Updated: 2025-11-04T18:49:38.095Z
Status : Awaiting Analysis
Published: 2025-11-04T04:15:36.903
Modified: 2025-11-04T15:40:45.533
Link: CVE-2025-11007
No data.
OpenCVE Enrichment
Updated: 2025-11-04T16:33:26Z