CVE-2025-6688

The Simple Payment plugin for WordPress is vulnerable to Authentication Bypass in versions 1.3.6 to 2.3.8. This is due to the plugin not properly verifying a user's identity prior to logging them in through the create_user() function. This makes it possible for unauthenticated attackers to log in as administrative users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:idokd:simple_payment:*:*:*:*:*:wordpress:*:*

History

02 Jul 2025, 17:49

Type Values Removed Values Added
CPE cpe:2.3:a:idokd:simple_payment:*:*:*:*:*:wordpress:*:*
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/8b4e2f87-e3ad-4f1b-b647-f5e5a49f691b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/8b4e2f87-e3ad-4f1b-b647-f5e5a49f691b?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/changeset/3318371/simple-payment/tags/2.3.9/simple-payment-plugin.php - () https://plugins.trac.wordpress.org/changeset/3318371/simple-payment/tags/2.3.9/simple-payment-plugin.php - Patch
First Time Idokd simple Payment
Idokd

27 Jun 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-27 08:15

Updated : 2025-07-02 17:49


NVD link : CVE-2025-6688

Mitre link : CVE-2025-6688


JSON object : View

Products Affected

idokd

  • simple_payment
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel