Description
The Ace User Management WordPress plugin through 2.0.3 does not properly validate that a password reset token is associated with the user who requested it, allowing any authenticated users, such as subscriber to reset the password of arbitrary accounts, including administrators.
Published: 2025-11-05
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privileged Account Compromise via Password Reset
Action: Update Plugin
AI Analysis

Impact

The Ace User Management plugin for WordPress version 2.0.3 and earlier fails to verify that a password‑reset token is linked to the user making the request, allowing any authenticated user, such as a subscriber, to reset the passwords of arbitrary accounts, including administrators. This flaw enables an attacker to gain full control of privileged accounts by simply entering a new password for the target. The vulnerability corresponds to a missing authorization weakness (CWE‑285) and is assigned a CVSS score of 6.3, indicating moderate severity.

Affected Systems

WordPress sites running the Ace User Management plugin with a version of 2.0.3 or earlier. The plugin is the sole product affected; no other WordPress components are implicated.

Risk and Exploitability

The CVSS score of 6.3 reflects moderate risk. The EPSS score of less than 1% indicates that, at present, the probability of exploitation is low, and the flaw is not listed in the CISA KEV catalog. An attacker must be authenticated and able to submit the password‑reset form; no special code injection or remote code execution is required. Once an authenticated session exists, the exploit can be performed by instructing the site to reset any user’s password, making this a relatively straightforward privilege escalation vector.

Generated by OpenCVE AI on April 28, 2026 at 10:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Ace User Management to the latest available version where the token‑validation bug is fixed.
  • Force all users to reset their passwords or otherwise invalidate existing reset tokens to eliminate any compromised credentials.
  • Temporarily disable the password‑reset functionality (e.g., via a plugin setting or WordPress hook) until the update is applied and monitor logs for unauthorized changes.

Generated by OpenCVE AI on April 28, 2026 at 10:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-285

Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Acewebx
Acewebx ace User Management
Wordpress
Wordpress wordpress
Vendors & Products Acewebx
Acewebx ace User Management
Wordpress
Wordpress wordpress

Wed, 05 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 06:15:00 +0000

Type Values Removed Values Added
Description The Ace User Management WordPress plugin through 2.0.3 does not properly validate that a password reset token is associated with the user who requested it, allowing any authenticated users, such as subscriber to reset the password of arbitrary accounts, including administrators.
Title Ace User Management <= 2.0.3 - Subscriber+ Authentication Bypass via Password Rest
References

Subscriptions

Acewebx Ace User Management
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-02T12:39:55.948Z

Reserved: 2025-06-12T12:45:31.146Z

Link: CVE-2025-6027

cve-icon Vulnrichment

Updated: 2025-11-05T18:31:43.524Z

cve-icon NVD

Status : Deferred

Published: 2025-11-05T06:15:34.373

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6027

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:30:29Z

Weaknesses