- Description
- The WP Email Debug plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the WPMDBUG_handle_settings() function in versions 1.0 to 1.1.0. This makes it possible for unauthenticated attackers to enable debugging and send all emails to an attacker controlled address and then trigger a password reset for an administrator to gain access to an administrator account.
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- security@wordfence.com
- CWE-862
- Hype score
- Not currently trending
CVE-2025-5486 (CVSS:9.8, CRITICAL) is Awaiting Analysis. The WP Email Debug plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the W..https://t.co/7CIb9fa8il #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
11 Jun 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-5486: CRITICAL] WordPress Email Debug plugin is at risk for privilege escalation in versions 1.0 to 1.1.0. Attackers can exploit this vulnerability to gain access to administrator accounts.#cve,CVE-2025-5486,#cybersecurity https://t.co/GtBVZA7JNI https://t.co/m0gnIUxpY6
@CveFindCom
6 Jun 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-5486 The WP Email Debug plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the WPMDBUG_handle_settings() function in versions 1.… https://t.co/ATqrPCKgDC
@CVEnew
6 Jun 2025
219 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes