Description
The StreamTube Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 4.78. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited if the 'registration password fields' enabled in theme options.
Published: 2025-11-30
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated user password change that can lead to administrator takeover
Action: Patch Immediately
AI Analysis

Impact

The StreamTube Core plugin for WordPress is vulnerable to arbitrary user password change in all releases up to and including version 4.78. The flaw arises because the plugin allows user‑controlled access to objects, enabling a user to bypass the normal authorization checks required to change passwords for any account. If an attacker can identify a target username, they can alter that account’s password without possessing valid credentials, thereby gaining the same access that the legitimate account holder holds. This is a classic privilege escalation weakness classified as CWE‑639.

Affected Systems

All installations of the phpface StreamTube Core theme running version 4.78 or earlier, and with the "registration password fields" option enabled in the theme settings. No specific operating system or PHP version is required beyond the normal WordPress hosting environment.

Risk and Exploitability

With a CVSS score of 9.8 the vulnerability is considered critical, yet the EPSS score of less than 1% indicates that, as of now, exploitation is unlikely but not impossible. The flaw is not listed in the CISA KEV catalog, meaning there are no publicly confirmed exploits in the wild. Attackers can exploit the issue by sending crafted HTTP requests to the front‑end of the site where the plugin is active; the attacker does not need any credentials, but must target a user whose account exists. Once the password is changed, the attacker can log in with the new credentials and take full control of the WordPress administration area.

Generated by OpenCVE AI on April 21, 2026 at 17:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the StreamTube Core plugin to the latest available version (4.79 or newer).
  • Disable the "registration password fields" option in the theme settings until the plugin has been updated.
  • If the plugin is no longer needed, consider uninstalling it to remove the attack surface.

Generated by OpenCVE AI on April 21, 2026 at 17:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 01 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Mon, 01 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 30 Nov 2025 02:15:00 +0000

Type Values Removed Values Added
Description The StreamTube Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 4.78. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited if the 'registration password fields' enabled in theme options.
Title StreamTube Core <= 4.78 - Unauthenticated Arbitrary User Password Change
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:43.665Z

Reserved: 2025-11-24T18:46:54.192Z

Link: CVE-2025-13615

cve-icon Vulnrichment

Updated: 2025-12-01T13:31:37.058Z

cve-icon NVD

Status : Deferred

Published: 2025-11-30T02:15:58.233

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13615

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:00:11Z

Weaknesses