Impact
A missing authorization check in the reset_user_password REST handler of the Appy Pie Connect for WooCommerce plugin allows an attacker to reset the password of any user, including administrators. This results in full administrative access once the new password is set. Based on the description, it is inferred that this flaw is a classic authorization bypass (CWE‑620).
Affected Systems
The vulnerability affects the Appy Pie Connect for WooCommerce WordPress plugin supplied by hancock11. All releases up to and including version 1.1.2 are impacted; later releases are not affected.
Risk and Exploitability
The CVSS score of 9.8 classifies the flaw as critical, while the EPSS score of less than 1% indicates a low current exploitation probability. The issue is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector involves sending a crafted HTTP request to the WordPress REST API endpoint that handles password resets, with no authentication or other prerequisites required, allowing any internet‑accessible attacker to compromise accounts.
OpenCVE Enrichment
EUVD