๐Ÿ” CVE Alert

CVE-2025-3605

CRITICAL 9.8

Frontend Login and Registration Blocks <= 1.1.1 - Unauthenticated Privilege Escalation via Account Takeover

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the flr_blocks_user_settings_handle_ajax_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

CWE CWE-639
Vendor arkenon
Product login, registration and lost password blocks
Published May 9, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for arkenon login, registration and lost password blocks

Be the first to know when new critical vulnerabilities affecting arkenon login, registration and lost password blocks are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

arkenon / Login, Registration and Lost Password Blocks
0 โ‰ค 1.1.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/0c11668c-6dc3-4539-b2be-bf6528bed73e?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/frontend-login-and-registration-blocks/trunk/inc/class-flr-blocks-user-settings.php#L59

Credits

Kenneth Dunn