[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fU8hhAGnpITg4sDerbk7v2j0do_W24iTXG6CAO5h9Quk":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-60041","emails-catch-authenticated-subscriber-information-exposure-to-password-reset-and-privilege-escalation","Emails Catch \u003C= 3.5.3 - Authenticated (Subscriber+) Information Exposure to Password Reset and Privilege Escalation","The Emails Catch All plugin for WordPress is vulnerable to privilege escalation via email log exposure in all versions up to, and including, 3.5.3. This is due to the plugin not properly restricting access to email logs. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger a password reset email that gets logged for all users, including administrators, and leverage that to reset the user's password and gain access to their account.","emails-catch-all",null,"\u003C=3.5.3","3.5.4","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Exposure of Sensitive Information to an Unauthorized Actor","2025-10-11 00:00:00","2025-10-23 14:49:21",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F82b87634-f740-4e4e-bc7e-f8bf7e657486?source=api-prod",13]