Authentication Bypass Using an Alternate Path or Channel vulnerability in Iulia Cazan Emails Catch All emails-catch-all allows Password Recovery Exploitation.This issue affects Emails Catch All: from n/a through <= 3.5.3.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 22 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authentication Bypass Using an Alternate Path or Channel vulnerability in Iulia Cazan Emails Catch All emails-catch-all allows Password Recovery Exploitation.This issue affects Emails Catch All: from n/a through <= 3.5.3. | |
| Title | WordPress Emails Catch All plugin <= 3.5.3 - Broken Authentication vulnerability | |
| Weaknesses | CWE-288 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published: 2025-10-22T14:32:40.107Z
Updated: 2025-10-23T13:28:41.370Z
Reserved: 2025-09-25T15:19:17.076Z
Link: CVE-2025-60041
Updated: 2025-10-23T13:20:51.183Z
Status : Awaiting Analysis
Published: 2025-10-22T15:15:56.660
Modified: 2025-10-23T14:15:41.720
Link: CVE-2025-60041
No data.