Authentication Bypass Using an Alternate Path or Channel vulnerability in Iulia Cazan Emails Catch All emails-catch-all allows Password Recovery Exploitation.This issue affects Emails Catch All: from n/a through <= 3.5.3.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 22 Oct 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Authentication Bypass Using an Alternate Path or Channel vulnerability in Iulia Cazan Emails Catch All emails-catch-all allows Password Recovery Exploitation.This issue affects Emails Catch All: from n/a through <= 3.5.3. | |
Title | WordPress Emails Catch All plugin <= 3.5.3 - Broken Authentication vulnerability | |
Weaknesses | CWE-288 | |
References |
|

Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2025-10-22T14:32:40.107Z
Reserved: 2025-09-25T15:19:17.076Z
Link: CVE-2025-60041

No data.

Status : Received
Published: 2025-10-22T15:15:56.660
Modified: 2025-10-22T15:15:56.660
Link: CVE-2025-60041

No data.

No data.