Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 13 Nov 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 23 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 22 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authentication Bypass Using an Alternate Path or Channel vulnerability in Iulia Cazan Emails Catch All emails-catch-all allows Password Recovery Exploitation.This issue affects Emails Catch All: from n/a through <= 3.5.3. | |
| Title | WordPress Emails Catch All plugin <= 3.5.3 - Broken Authentication vulnerability | |
| Weaknesses | CWE-288 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2025-11-13T10:33:44.534Z
Reserved: 2025-09-25T15:19:17.076Z
Link: CVE-2025-60041
Updated: 2025-10-23T13:20:51.183Z
Status : Awaiting Analysis
Published: 2025-10-22T15:15:56.660
Modified: 2025-11-13T11:16:41.927
Link: CVE-2025-60041
No data.
OpenCVE Enrichment
Updated: 2025-10-23T10:03:26Z