Impact
The Doccure WordPress theme version 1.5.0 and earlier allows an unauthenticated user to reset any account password through a bypass of the theme’s authorization checks, effectively granting full control of administrator accounts. This flaw arises from the plugin exposing user‑controlled access to the password‑change functionality without validating the requester’s privileges, as identified by CWE‑639. An attacker exploiting this flaw can compromise user confidentiality, integrity, and availability by taking over privileged accounts.
Affected Systems
The vulnerability affects the Doccure theme for WordPress provided by dreamstechnologies. Any installation of the Doccure theme v1.5.0 or earlier is affected, including all WordPress sites that have not upgraded beyond version 1.5.0.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity, while the EPSS score of less than 1% suggests a low exploitation likelihood at present; however the vulnerability is not yet cataloged in the CISA KEV. Attackers can exploit the flaw without authentication by sending a crafted request to the WordPress site, bypassing authorization checks to trigger a password change. The lack of required credentials makes this a highly scalable attack vector for compromising administrator accounts.
OpenCVE Enrichment
EUVD