The Dokan Pro plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.5. This is due to the plugin not properly validating a user's identity prior to updating their password during a staff password reset. This makes it possible for authenticated attackers, with vendor-level access and above, to elevate their privilege to the level of a staff member and then change arbitrary user passwords, including those of administrators in order to gain access to their accounts. By default, the plugin allows customers to become vendors.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 26 Aug 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Dokan Pro plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.5. This is due to the plugin not properly validating a user's identity prior to updating their password during a staff password reset. This makes it possible for authenticated attackers, with vendor-level access and above, to elevate their privilege to the level of a staff member and then change arbitrary user passwords, including those of administrators in order to gain access to their accounts. By default, the plugin allows customers to become vendors. | |
Title | Dokan Pro <= 4.0.5 - Authenticated (Vendor+) Privilege Escalation | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-26T05:07:47.410Z
Updated: 2025-08-26T15:40:18.405Z
Reserved: 2025-06-09T14:52:15.433Z
Link: CVE-2025-5931

Updated: 2025-08-26T15:40:14.730Z

Status : Awaiting Analysis
Published: 2025-08-26T05:15:32.453
Modified: 2025-08-26T13:41:58.950
Link: CVE-2025-5931

No data.