CVE-2025-15018
The · The Optional Email plugin for WordPress
A critical vulnerability has been identified in the Optional Email plugin for WordPress, which allows unauthenticated attackers to take over any user account, including those with administrative privi.
Executive summary
A critical vulnerability has been identified in the Optional Email plugin for WordPress, which allows unauthenticated attackers to take over any user account, including those with administrative privileges. Successful exploitation could lead to a complete compromise of the affected website, enabling attackers to steal data, deface the site, or install malware. Immediate patching is required to mitigate this severe risk.
Vulnerability
The vulnerability exists because a specific function within the plugin, intended for user registration, is improperly applied to the password reset process. The 'random_password' filter is not restricted to its intended context and affects the generation of password reset keys. An unauthenticated attacker can exploit this by initiating a password reset request for any user on the site and then supplying a known value as the password reset key, allowing them to bypass security checks, set a new password, and gain complete control over the victim's account.
Business impact
Business Impact This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation by an unauthenticated attacker could lead to a full compromise of the WordPress site. The potential consequences include theft of sensitive customer or corporate data, website defacement, distribution of malware to site visitors, and reputational damage. An attacker with administrative access could also use the compromised website as a pivot point to launch further attacks against the organization's internal network, leading to significant financial and operational disruption.
Remediation
Immediate Action: Immediately update the Optional Email plugin for WordPress to the latest patched version as recommended by the vendor. After patching, it is crucial to review all user accounts, especially administrative accounts, for any unauthorized changes or suspicious activity. Review access logs for signs of exploitation attempts that may have occurred prior to the update.
Proactive Monitoring: Monitor web server and application logs for an unusual number of password reset attempts, particularly from a single IP address targeting multiple accounts. Scrutinize logs for successful password resets followed by immediate logins from unfamiliar IP addresses or locations. Implement alerts for the creation of new administrative accounts or unexpected privilege changes to existing accounts.
Compensating Controls: If immediate patching is not feasible, consider disabling the Optional Email plugin until it can be updated. Implementing a Web Application Firewall (WAF) with rules specifically designed to block or alert on suspicious password reset requests can provide a layer of defense. Enforcing Multi-Factor Authentication (MFA) for all users, especially administrators, can also mitigate the risk by preventing an attacker from logging in even if they successfully reset a password.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a severe and immediate threat to any organization using the affected plugin. An unauthenticated attacker can gain complete administrative control over a website with minimal effort. We strongly recommend that organizations apply the vendor-supplied patch to all affected systems immediately. Due to the high risk of full system compromise, this vulnerability should be treated as a top priority for remediation.