CVE-2025-14996
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
The AS Password Field In Default Registration Form plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.0.0. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
Analysis
AS Password Field plugin for WordPress (through 2.0.0) allows unauthenticated password resets for any user without identity verification. Like CVE-2025-14998 (Branda), this enables immediate administrator account takeover.
Technical Context
The password update function does not verify the requester's identity (CWE-639). An attacker can reset any user's password without knowing the current password or possessing a valid reset token.
Affected Products
AS Password Field In Default Registration Form for WordPress through 2.0.0
Remediation
Remove this plugin immediately. Reset all user passwords. Enable MFA for admin accounts.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today