{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T11:36:44.577","vulnerabilities":[{"cve":{"id":"CVE-2025-3952","sourceIdentifier":"security@wordfence.com","published":"2025-05-01T05:15:52.020","lastModified":"2025-05-19T11:54:42.067","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Projectopia – WordPress Project Management plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'pto_remove_logo' function in all versions up to, and including, 5.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary option values on the WordPress site. This can be leveraged to delete an option that would create an error on the site and deny service to legitimate users."},{"lang":"es","value":"El complemento Projectopia – WordPress Project Management de WordPress es vulnerable a la modificación no autorizada de datos, lo que puede provocar una denegación de servicio debido a la falta de comprobación de la función «pto_remove_logo» en todas las versiones hasta la 5.1.16 incluida. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, eliminar valores de opciones arbitrarios en el sitio de WordPress. Esto puede aprovecharse para eliminar una opción que generaría un error en el sitio y denegaría el servicio a usuarios legítimos."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:projectopia:projectopia:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"5.1.17","matchCriteriaId":"27C14F7C-656F-45AB-AB00-8D2E2B96AFE8"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/projectopia-core/trunk/includes/functions/admin/admin_functions.php#L838","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3284330/","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/de7489e8-fe18-4a80-832c-aa62424c538b?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}