CVE-2025-31380

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication and reset passwords for any user account in the Paid Videochat Turnkey Site WordPress plugin due to a weak password recovery mechanism. It affects all WordPress sites using this plugin from version n/a through 7.3.11. Attackers can take over administrator or user accounts without authentication.

💻 Affected Systems

Products:
  • Paid Videochat Turnkey Site (PPV Live Webcams WordPress plugin)
Versions: n/a through 7.3.11
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, compromise all user accounts, steal sensitive data, deface the website, or install malware/backdoors.

🟠

Likely Case

Account takeover of regular users leading to unauthorized access to paid content, personal data theft, and potential privilege escalation to administrative roles.

🟢

If Mitigated

Limited impact with proper monitoring and detection, but still requires immediate remediation to prevent credential theft.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing, and this vulnerability requires no authentication, making it easily exploitable from anywhere.
🏢 Internal Only: LOW - This is primarily an internet-facing web application vulnerability, though internal users could exploit it if they have network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves broken authentication in password recovery, which typically requires minimal technical skill to exploit once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.12 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/ppv-live-webcams/vulnerability/wordpress-paid-videochat-turnkey-site-7-3-5-broken-authentication-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Paid Videochat Turnkey Site' or 'PPV Live Webcams'. 4. Click 'Update Now' if update is available. 5. If no update appears, manually download version 7.3.12+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable vulnerable plugin

linux

Temporarily disable the plugin until patched to prevent exploitation

wp plugin deactivate ppv-live-webcams

Restrict password reset functionality

all

Implement web application firewall rules to block suspicious password reset attempts

🧯 If You Can't Patch

  • Implement strong network segmentation to isolate the vulnerable system
  • Enable detailed logging and monitoring for password reset attempts and account changes

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for 'Paid Videochat Turnkey Site' version. If version is 7.3.11 or lower, system is vulnerable.

Check Version:

wp plugin get ppv-live-webcams --field=version

Verify Fix Applied:

Verify plugin version is 7.3.12 or higher in WordPress admin panel. Test password reset functionality to ensure proper authentication is required.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of password reset requests
  • Password reset attempts from unexpected IP addresses
  • Successful password resets without proper user verification

Network Indicators:

  • HTTP POST requests to password reset endpoints with unusual patterns
  • Multiple failed authentication attempts followed by password reset requests

SIEM Query:

source="wordpress.log" AND ("password-reset" OR "lost-password") AND status=200 | stats count by src_ip

🔗 References

📤 Share & Export