The Dokan Pro plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.5. This is due to the plugin not properly validating a user's identity prior to updating their password during a staff password reset. This makes it possible for authenticated attackers, with vendor-level access and above, to elevate their privilege to the level of a staff member and then change arbitrary user passwords, including those of administrators in order to gain access to their accounts. By default, the plugin allows customers to become vendors.
History

Tue, 26 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 26 Aug 2025 05:15:00 +0000

Type Values Removed Values Added
Description The Dokan Pro plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.5. This is due to the plugin not properly validating a user's identity prior to updating their password during a staff password reset. This makes it possible for authenticated attackers, with vendor-level access and above, to elevate their privilege to the level of a staff member and then change arbitrary user passwords, including those of administrators in order to gain access to their accounts. By default, the plugin allows customers to become vendors.
Title Dokan Pro <= 4.0.5 - Authenticated (Vendor+) Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-08-26T05:07:47.410Z

Updated: 2025-08-26T15:40:18.405Z

Reserved: 2025-06-09T14:52:15.433Z

Link: CVE-2025-5931

cve-icon Vulnrichment

Updated: 2025-08-26T15:40:14.730Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-26T05:15:32.453

Modified: 2025-08-26T13:41:58.950

Link: CVE-2025-5931

cve-icon Redhat

No data.