The Simple Payment plugin for WordPress is vulnerable to Authentication Bypass in versions 1.3.6 to 2.3.8. This is due to the plugin not properly verifying a user's identity prior to logging them in through the create_user() function. This makes it possible for unauthenticated attackers to log in as administrative users.
References
Configurations
History
02 Jul 2025, 17:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:idokd:simple_payment:*:*:*:*:*:wordpress:*:* | |
First Time |
Idokd simple Payment
Idokd |
|
References | () https://plugins.trac.wordpress.org/changeset/3318371/simple-payment/tags/2.3.9/simple-payment-plugin.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/8b4e2f87-e3ad-4f1b-b647-f5e5a49f691b?source=cve - Third Party Advisory |
30 Jun 2025, 18:38
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 Jun 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-27 08:15
Updated : 2025-07-02 17:49
NVD link : CVE-2025-6688
Mitre link : CVE-2025-6688
CVE.ORG link : CVE-2025-6688
JSON object : View
Products Affected
idokd
- simple_payment
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel