Description
The IMITHEMES Listing plugin is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.3. This is due to the plugin not properly validating a verification code value prior to updating their password through the imic_reset_password_init() function. This makes it possible for unauthenticated attackers to change any user's passwords, including administrators if the users email is known.
Published: 2025-05-09
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Password Reset Abuse
Action: Patch
AI Analysis

Impact

The IMITHEMES Listing plugin fails to validate a verification code when resetting passwords, allowing an unauthenticated attacker to change any user’s password if the user’s email address is known. The consequence is full control over that user’s account, including administrator accounts, thereby compromising confidentiality, integrity, and availability of the WordPress site. This weakness is categorized as CWE-620.

Affected Systems

The vulnerability affects all releases of the IMITHEMES Listing plugin up to and including version 3.3. Only users installing these versions are at risk; newer releases are presumed to have addressed the flaw.

Risk and Exploitability

The flaw carries a CVSS score of 9.8, indicating a high severity impact. The EPSS score is less than 1%, suggesting exploitation is not widespread but still possible. The vulnerability is not listed in CISA’s KEV catalog. An attacker can simply send a password reset request to the plugin’s endpoint with a known user email, bypass authentication, and set a new password, then use the account to further compromise the site. No special privileges or network access are required beyond the ability to send HTTP requests to the server.

Generated by OpenCVE AI on April 21, 2026 at 20:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade IMITHEMES Listing to a release newer than 3.3 that contains the fix.
  • If an upgrade is not immediately possible, restrict access to the password reset endpoint by using firewall rules or web‑application settings to allow only trusted IP addresses or require authentication before password reset.
  • Change all user passwords, especially administrator accounts, to strong, unique values after deployment of the fix or restriction measures.
  • Monitor web application logs for unexpected password reset attempts and enforce rate limiting to mitigate brute‑force efforts.

Generated by OpenCVE AI on April 21, 2026 at 20:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14129 The IMITHEMES Listing plugin is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.3. This is due to the plugin not properly validating a verification code value prior to updating their password through the imic_reset_password_init() function. This makes it possible for unauthenticated attackers to change any user's passwords, including administrators if the users email is known.
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00105}

epss

{'score': 0.00109}


Fri, 09 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 May 2025 07:00:00 +0000

Type Values Removed Values Added
Description The IMITHEMES Listing plugin is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.3. This is due to the plugin not properly validating a verification code value prior to updating their password through the imic_reset_password_init() function. This makes it possible for unauthenticated attackers to change any user's passwords, including administrators if the users email is known.
Title IMITHEMES Listing <= 3.3 - Unauthenticated Privilege Escalation via Unverified Password Reset
Weaknesses CWE-620
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:52.808Z

Reserved: 2025-03-12T14:44:35.469Z

Link: CVE-2025-2253

cve-icon Vulnrichment

Updated: 2025-05-09T15:41:19.464Z

cve-icon NVD

Status : Deferred

Published: 2025-05-09T07:16:04.010

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2253

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T21:00:36Z

Weaknesses