Vulnerability Description
The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to privilege escalation via account takeover in versions 2.0.0 to 2.6.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email & password through the update() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wpshop/tags/2.6.0//core/external/eo-f
- https://plugins.trac.wordpress.org/browser/wpshop/tags/2.6.0//modules/api/action
- https://plugins.trac.wordpress.org/browser/wpshop/tags/2.6.0/core/external/eo-fr
- https://www.wordfence.com/threat-intel/vulnerabilities/id/96b8186c-dfe9-4137-b28
FAQ
What is CVE-2025-3852?
CVE-2025-3852 is a vulnerability with a CVSS score of 8.8 (HIGH). The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to privilege escalation via account takeover in versions 2.0.0 to 2.6.0. This is due to the plugin not properly validating a user's identit...
How severe is CVE-2025-3852?
CVE-2025-3852 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3852?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.