First published: Wed May 07 2025(Updated: )
The PeproDev Ultimate Profile Solutions plugin for WordPress is vulnerable to Authentication Bypass in versions 1.9.1 to 7.5.2. This is due to handel_ajax_req() function not having proper restrictions on the change_user_meta functionality that makes it possible to set a OTP code and subsequently log in with that OTP code. This makes it possible for unauthenticated attackers to login as other users on the site, including administrators.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
PeproDev Ultimate Profile Solutions | >=1.9.1<=7.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3844 is classified as a high severity vulnerability due to its potential for unauthorized access through authentication bypass.
To fix CVE-2025-3844, update the PeproDev Ultimate Profile Solutions plugin to a version later than 7.5.2.
CVE-2025-3844 affects PeproDev Ultimate Profile Solutions versions from 1.9.1 to 7.5.2.
CVE-2025-3844 is caused by inadequate restrictions in the handel_ajax_req() function on modifying user meta data.
CVE-2025-3844 can be exploited by attackers to set an OTP code for a user without proper authentication, leading to unauthorized actions.