VYPR
Medium severity6.3NVD Advisory· Published Nov 5, 2025· Updated Apr 15, 2026

CVE-2025-6027

CVE-2025-6027

Description

The Ace User Management WordPress plugin through 2.0.3 does not properly validate that a password reset token is associated with the user who requested it, allowing any authenticated users, such as subscriber to reset the password of arbitrary accounts, including administrators.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Ace User Management plugin <=2.0.3 allows authenticated users to reset passwords of arbitrary accounts due to improper password reset token validation.

The Ace User Management WordPress plugin through version 2.0.3 fails to properly verify that a password reset token belongs to the user who requested it. This flaw arises from insufficient validation during the password reset flow, where the token is not securely tied to the user's session or identity.

An authenticated attacker with subscriber-level privileges can exploit this by requesting a password reset for any account, including administrators. Since the plugin does not validate the token's association with the requesting user, the attacker can then use the reset link to change the target user's password.

Successful exploitation allows the attacker to gain full control over the affected account, potentially escalating privileges to administrator and compromising the entire WordPress site.

As of the publication date, no fix is available for this vulnerability. Administrators are advised to disable the plugin or monitor for updates from the developer. The vulnerability has been publicly disclosed with no known workaround [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.