CVE-2025-3605
Frontend Login and Registration Blocks <= 1.1.1 - Unauthenticated Privilege Escalation via Account Takeover
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the flr_blocks_user_settings_handle_ajax_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
| CWE | CWE-639 |
| Vendor | arkenon |
| Product | login, registration and lost password blocks |
| Published | May 9, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for arkenon login, registration and lost password blocks
Be the first to know when new critical vulnerabilities affecting arkenon login, registration and lost password blocks are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
arkenon / Login, Registration and Lost Password Blocks
0 โค 1.1.1
References
Credits
Kenneth Dunn