Description
The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and excluding, 6.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
Published: 2025-11-01
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Account Takeover
Action: Immediate Patch
AI Analysis

Impact

The Service Finder Bookings plugin for WordPress allows an authenticated user with subscriber level access or higher to modify any user’s email address. Because the plugin does not verify the identity of the user making the change, a malicious account can change the email of an administrator or other privileged user, trigger a password reset, and take control of that account. This flaw allows an attacker to update any user’s email address and potentially take over their account via password reset. The weakness is an identity validation failure, classified as CWE‑639.

Affected Systems

This issue affects the Service Finder Bookings WordPress plugin from aonetheme for all released versions prior to 6.1. Any WordPress installation using these older plugin versions is susceptible.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.8, indicating high potential impact. However, the EPSS score is below 1%, suggesting that exploitation is currently uncommon. The flaw is not listed in the CISA KEV catalog. An attacker must already be authenticated with a subscriber or higher role, then use the plugin’s user‑management interface to modify another user’s email. Once the email is changed, the attacker can initiate a password reset and gain administrative access.

Generated by OpenCVE AI on April 22, 2026 at 16:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Service Finder Bookings to version 6.1 or later to apply the vendor’s fix for identity validation
  • If an upgrade is delayed, restrict the permissions of subscriber roles so that they cannot edit user profiles or email addresses
  • Immediately reset strong passwords for all administrator accounts and review recovery options to prevent unauthorized resets
  • Monitor the site’s user‑management logs for anomalous email changes or reset requests

Generated by OpenCVE AI on April 22, 2026 at 16:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 01 Nov 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and excluding, 6.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
Title Service Finder Bookings < 6.1 - Authenticated (Subscriber+) Privilege Escalation via Account Takeover
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:42:42.084Z

Reserved: 2025-06-24T14:07:03.697Z

Link: CVE-2025-6574

cve-icon Vulnrichment

Updated: 2025-11-03T13:22:13.222Z

cve-icon NVD

Status : Deferred

Published: 2025-11-01T07:15:35.727

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:45:21Z

Weaknesses