CVE-2025-3607
Frontend Login and Registration Blocks <= 1.0.8 - Authenticated (Subscriber+) Privilege Escalation via Password Reset
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.8. This is due to the plugin not properly validating a user's identity prior to updating a password. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
| CWE | CWE-620 |
| Vendor | arkenon |
| Product | login, registration and lost password blocks |
| Published | Apr 24, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for arkenon login, registration and lost password blocks
Be the first to know when new high vulnerabilities affecting arkenon login, registration and lost password blocks are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
arkenon / Login, Registration and Lost Password Blocks
0 โค 1.0.8
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/b06ce1e4-5cfb-415d-ad09-db194d6b4354?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/frontend-login-and-registration-blocks/trunk/inc/class-flr-blocks-lost-password.php#L115 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3325911/#file35 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3325911/#file10
Credits
Kenneth Dunn