{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T07:16:14.642","vulnerabilities":[{"cve":{"id":"CVE-2025-1717","sourceIdentifier":"security@wordfence.com","published":"2025-02-27T08:15:31.130","lastModified":"2026-04-08T19:23:51.760","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Login Me Now plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.2. This is due to insecure authentication based on an arbitrary transient name in the 'AutoLogin::listen()' function. This makes it possible for unauthenticated attackers to log in an existing user on the site, even an administrator. Note: this vulnerability requires using a transient name and value from another software, so the plugin is not inherently vulnerable on it's own."},{"lang":"es","value":"El complemento Login Me Now para WordPress es vulnerable a la omisión de la autenticación en versiones hasta la 1.7.2 incluida. Esto se debe a una autenticación insegura basada en un nombre transitorio arbitrario en la función 'AutoLogin::listen()'. Esto hace posible que atacantes no autenticados inicien sesión en un usuario existente en el sitio, incluso si es un administrador. Nota: esta vulnerabilidad requiere el uso de un nombre y un valor transitorios de otro software, por lo que el complemento no es inherentemente vulnerable por sí mismo."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-288"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pluginly:login_me_now:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"1.7.2","matchCriteriaId":"B33D8036-17F4-4D22-AF3A-C0FD0C95A9C4"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/login-me-now/tags/1.7.2/app/Logins/BrowserTokenLogin/AutoLogin.php#L24","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3247924/login-me-now","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/fc689622-50d6-47c4-a5f6-0314b1a207c9?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}