Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme

Posted on October 9, 2025October 9, 2025 By CWS

Oct 09, 2025Ravie LakshmananVulnerability / Web site Safety
Menace actors are actively exploiting a vital safety flaw impacting the Service Finder WordPress theme that makes it potential to achieve unauthorized entry to any account, together with directors, and take management of prone websites.
The authentication bypass vulnerability, tracked as CVE-2025-5947 (CVSS rating: 9.8), impacts the Service Finder Bookings, a WordPress plugin bundled with the Service Finder theme. It was found by a researcher who goes by the title Foxyyy.
“This vulnerability makes it potential for an unauthenticated attacker to achieve entry to any account on a web site, together with accounts with the ‘administrator’ function,” Wordfence researcher István Márton stated.
The issue, at its core, is a case of privilege escalation stemming from authentication bypass because of the plugin not adequately validating a person’s cookie worth earlier than logging them in by an account switching perform (service_finder_switch_back()).
Consequently, an unauthenticated attacker might reap the benefits of this habits to check in to the positioning as any person, together with directors, successfully hijacking the positioning and utilizing it for nefarious functions, resembling inserting malicious code to redirect customers to pretend websites or use it to host malware.

The shortcoming impacts all variations of the theme previous to and together with 6.0. It was addressed by the plugin maintainers on July 17, 2025, with the discharge of model 6.1. The theme has been offered to greater than 6,100 prospects, per information from Envato Market.
The WordPress safety firm stated it has noticed exploitation exercise focusing on CVE-2025-5947 since August 1, 2025, with over 13,800 makes an attempt detected up to now. Nonetheless, the success fee of those efforts is at present not clear.

The next IP addresses have been noticed focusing on the Service Finder Bookings plugin account switching perform –

5.189.221.98
185.109.21.157
192.121.16.196
194.68.32.71
178.125.204.198

Directors are really helpful to audit their websites for any indicators of suspicious exercise and guarantee all of the plugins and themes are working the most recent model.

The Hacker News Tags:Authentication, Bypass, Critical, Exploit, Finder, Hackers, Lets, Service, Theme, WordPress

Post navigation

Previous Post: IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed
Next Post: GitLab Security Update – Patch For Multiple Vulnerabilities That Enables DoS Attack

Related Posts

Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code The Hacker News
Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials The Hacker News
New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands The Hacker News
Cisco Warns of New Firewall Attack Exploiting CVE-2025-20333 and CVE-2025-20362 The Hacker News
Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks The Hacker News
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark