[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fUMf4bgwmA2UzYaiPkM6rA6CmU5mopWKtt3ExYxU0gbc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-24643","one-to-one-user-chat-by-wpguppy-authorization-bypass","One to one user Chat by WPGuppy \u003C= 1.1.0 - Authorization Bypass","The One to one user Chat by WPGuppy plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.1.0. This is due to the plugin not properly verifying a user's identity prior to using wp_set_current_user(). This makes it possible for unauthenticated attackers to spoof other users and modify some of the plugin's settings.","wpguppy-lite",null,"\u003C=1.1.0","1.1.1","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Authorization Bypass Through User-Controlled Key","2025-01-09 00:00:00","2025-02-24 15:51:28",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa3271d69-fa4a-42db-8bea-dd54d5a9bc6b?source=api-prod",47]