You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Jobmonster theme for WordPress is vulnerable to authentication bypass in versions up to, and including, 4.9.4. This is due to improper validation of the 'check_login' email parameter, allowing unauthenticated attackers to log in as any user, including administrators.
9
-
remediation: Update to version 4.9.5 or later.
8
+
The Jobmonster theme for WordPress is vulnerable to authentication bypass in versions up to, and including, 4.7.9. This is due to improper implementation of authentication controls, allowing unauthenticated attackers to bypass normal authentication controls, potentially leading to complete site compromise.
name: Service Finder Bookings - Authentication Bypass
6
-
author: sedat4ras
4
+
name: Service Finder Bookings <= 6.0 - Authentication Bypass
5
+
author: alita-p8
7
6
severity: critical
8
7
description: |
9
8
Service Finder Bookings WordPress plugin <= 6.0 contains a privilege escalation caused by improper validation of user cookie in service_finder_switch_back() function, letting unauthenticated attackers login as any user including admins.
name: Service Finder Bookings <= 3.5 - Auth Bypass
20
-
author: alita-p8
21
-
severity: critical
22
-
description: |
23
-
The Service Finder Bookings plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.5. This is due to insufficient session token validation or manipulation vulnerability, allowing attackers to gain unauthorized access to administrative accounts.
24
-
remediation: Update to the latest version available.
Copy file name to clipboardExpand all lines: http/cves/2025/CVE-2025-7384.yaml
+15-20Lines changed: 15 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -1,51 +1,46 @@
1
1
id: CVE-2025-7384
2
2
3
3
info:
4
-
name: Database for Contact Form 7, WPforms, Elementor forms <= 1.4.3 - Unauth RCE via Object Injection
4
+
name: Database for Contact Form 7, WPforms, Elementor forms <= 1.4.3 - PHP Object Injection
5
5
author: alita-p8
6
6
severity: critical
7
7
description: |
8
-
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.4.3 via PHP Object Injection. This allows unauthenticated attackers to execute arbitrary code if a suitable gadget chain is present on the server.
8
+
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This allows unauthenticated attackers to inject arbitrary PHP objects. While no known POP chain is present in the vulnerable software itself, exploitation is possible if a suitable gadget chain exists in the target environment.
0 commit comments