First published: Tue May 13 2025(Updated: )
The Frontend Dashboard plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ajax_request() function in versions 1.0 to 2.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to control where the plugin sends outgoing emails. By pointing SMTP to their own server, attackers could capture password reset emails intended for administrators, and elevate their privileges for full site takeover.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Frontend Dashboard | >=1.0<=2.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4473 has a medium severity level due to the potential for privilege escalation.
To fix CVE-2025-4473, update the Frontend Dashboard plugin to version 2.2.8 or later.
CVE-2025-4473 affects authenticated users with Subscriber-level access and above using versions 1.0 to 2.2.7 of the Frontend Dashboard plugin.
CVE-2025-4473 exploits a missing capability check in the ajax_request() function of the Frontend Dashboard plugin.
Yes, CVE-2025-4473 can potentially lead to unauthorized access to user data due to privilege escalation.