Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solwininfotech
Solwininfotech user Activity Log Wordpress Wordpress wordpress |
|
| Vendors & Products |
Solwininfotech
Solwininfotech user Activity Log Wordpress Wordpress wordpress |
Wed, 07 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The User Activity Log plugin is vulnerable to a limited options update in versions up to, and including, 2.2. The failed-login handler 'ual_shook_wp_login_failed' lacks a capability check and writes failed usernames directly into update_option() calls. This makes it possible for unauthenticated attackers to push select site options from 0 to a non-zero value, allowing them to reopen registration or corrupt options like 'wp_user_roles', breaking wp-admin access. | |
| Title | User Activity Log <= 2.2 - Unauthenticated Limited Options Update via Failed Login | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-07T16:12:51.394Z
Reserved: 2025-10-16T17:17:27.672Z
Link: CVE-2025-11877
Updated: 2026-01-07T14:47:36.251Z
Status : Received
Published: 2026-01-07T12:16:46.400
Modified: 2026-01-07T12:16:46.400
Link: CVE-2025-11877
No data.
OpenCVE Enrichment
Updated: 2026-01-08T09:49:51Z