First published: Wed May 07 2025(Updated: )
The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to privilege escalation via account takeover in versions 2.0.0 to 2.6.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email & password through the update() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPshop E-Commerce plugin | >=2.0.0<=2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3852 has a critical severity rating due to its potential for privilege escalation via account takeover.
To fix CVE-2025-3852, upgrade the WPshop E-Commerce plugin for WordPress to version 2.6.1 or later.
CVE-2025-3852 affects WPshop E-Commerce plugin versions from 2.0.0 to 2.6.0.
CVE-2025-3852 is a privilege escalation vulnerability that allows account takeover.
The vendor associated with CVE-2025-3852 is WPshop, the developer of the E-Commerce plugin for WordPress.