Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WordPress Plugin Vulnerability Let Attackers Bypass Authentication via Social Login

Posted on September 16, 2025September 16, 2025 By CWS

A important authentication bypass vulnerability within the Case Theme Consumer WordPress plugin has emerged as a big safety menace, permitting unauthenticated attackers to achieve administrative entry to web sites by exploiting the social login performance.

The vulnerability, tracked as CVE-2025-5821 with a CVSS rating of 9.8, impacts all variations of the plugin as much as 1.0.3 and impacts an estimated 12,000 energetic installations worldwide.

The safety flaw allows malicious actors to bypass authentication mechanisms totally, granting them unauthorized entry to any consumer account, together with administrator-level privileges, supplied they know or can uncover the goal’s e mail tackle.

What makes this vulnerability significantly harmful is its simplicity—attackers can exploit it by way of easy HTTP requests with out requiring refined instruments or intensive technical data.

Energetic exploitation started nearly instantly after the vulnerability’s public disclosure on August 22, 2025, with menace actors launching assaults the next day.

Wordfence analysts recognized the vulnerability by way of their bug bounty program and famous that the safety agency’s firewall has already blocked over 20,900 exploit makes an attempt focusing on this particular weak spot.

The fast onset of exploitation demonstrates the vulnerability’s attraction to cybercriminals searching for fast entry to WordPress websites.

The plugin is bundled with a number of premium themes, considerably increasing the assault floor past standalone installations.

Attackers have been noticed making an attempt to guess administrative e mail addresses utilizing frequent patterns similar to [email protected], [email protected], and [email protected], suggesting a scientific method to exploitation throughout a number of targets.

Exploitation Mechanism and Code Evaluation

The vulnerability stems from flawed logic within the facebook_ajax_login_callback() perform throughout the Case_Theme_User_Ajax class.

Exploit course of (Supply – Wordfence)

The perform processes social login requests by creating consumer accounts based mostly on provided e mail addresses, however fails to correctly validate the authentication state earlier than granting entry.

The exploit course of includes two distinct phases. Initially, attackers register a brief consumer account utilizing their very own e mail tackle by way of a POST request to /wp-admin/admin-ajax.php with the motion parameter set to facebook_ajax_login.

The malicious payload consists of fabricated Fb consumer information, similar to information[name]=temp and information[email][email protected], making a respectable consumer session.

Within the second section, attackers leverage the established session to authenticate because the goal sufferer by submitting one other request utilizing the identical short-term username however substituting the sufferer’s e mail tackle.

The susceptible code retrieves the consumer by e mail fairly than verifying the unique authentication token, successfully transferring session privileges to the goal account.

The patch launched in model 1.0.4 addresses this logic flaw by implementing correct authentication verification earlier than granting entry rights.

Web site directors ought to instantly replace to the most recent model and evaluation their entry logs for suspicious AJAX requests originating from identified malicious IP addresses, together with 2602:ffc8:2:105:216:3cff:fe96:129f and 146.70.186.142.

Free reside webinar on new malware ways from our analysts! Study superior detection methods -> Register for Free

Cyber Security News Tags:Attackers, Authentication, Bypass, Login, Plugin, Social, Vulnerability, WordPress

Post navigation

Previous Post: Neon Cyber Emerges from Stealth, Shining a Light into the Browser
Next Post: New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware

Related Posts

2/3 of Organizations Fear Identity Attacks, But Blind Spots Remain Cyber Security News
Malicious VS Code Extensions Attacking Windows Solidity Developers to Steal Login Credentials Cyber Security News
1.5 Billion Packets Per Second DDoS Attack Detected with FastNetMon Cyber Security News
1-Click Oracle Cloud Code Editor RCE Vulnerability Lets Attackers Upload Malicious Files Cyber Security News
Authorities Arrested Admins Of “LockerGoga,” “MegaCortex,” And “Nefilim” Ransomware Gands Cyber Security News
Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Exploitation of Oracle EBS Zero-Day Started 2 Months Before Patching
  • OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News