Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10294: CWE-288 Authentication Bypass Using an Alternate Path or Channel in victornavarro OwnID Passwordless Login

0
Critical
VulnerabilityCVE-2025-10294cvecve-2025-10294cwe-288
Published: Wed Oct 15 2025 (10/15/2025, 08:26:01 UTC)
Source: CVE Database V5
Vendor/Project: victornavarro
Product: OwnID Passwordless Login

Description

CVE-2025-10294 is a critical authentication bypass vulnerability in the OwnID Passwordless Login WordPress plugin (versions up to 1. 3. 4). The flaw arises because the plugin fails to verify if the ownid_shared_secret value is empty before authenticating users via JWT tokens. This allows unauthenticated attackers to log in as any user, including administrators, especially on sites where the plugin is not fully configured. The vulnerability has a CVSS score of 9. 8, indicating a severe risk with no user interaction or privileges required. Although no known exploits are currently reported in the wild, the potential for full site compromise is high. European organizations using this plugin on WordPress sites are at significant risk, particularly those with administrative or sensitive data exposure. Immediate mitigation involves ensuring the plugin is fully configured or disabling it until a patch is available.

AI-Powered Analysis

AILast updated: 01/05/2026, 11:07:57 UTC

Technical Analysis

CVE-2025-10294 is a critical vulnerability classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel) affecting the OwnID Passwordless Login plugin for WordPress. The vulnerability exists because the plugin does not properly check if the ownid_shared_secret parameter is empty before authenticating a user via JSON Web Tokens (JWT). This improper validation allows an unauthenticated attacker to bypass authentication controls and log in as any user, including administrators, on WordPress sites where the plugin is installed but not fully configured. The issue affects all versions up to and including 1.3.4. The attack vector requires no privileges and no user interaction, making exploitation straightforward if the plugin is misconfigured. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can gain full administrative control over the affected WordPress instance. While no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a critical threat. The plugin’s reliance on the ownid_shared_secret for JWT authentication means that if this secret is empty or missing, the authentication mechanism is effectively bypassed. This flaw is particularly dangerous during initial plugin setup phases or incomplete configurations, which are common in real-world deployments. The vulnerability highlights the importance of secure default configurations and robust input validation in authentication mechanisms.

Potential Impact

The impact on European organizations can be severe. Successful exploitation allows attackers to gain unauthorized administrative access to WordPress sites, potentially leading to full site compromise. This includes the ability to modify content, steal sensitive data, deploy malware, or pivot to other internal systems. Organizations relying on WordPress for corporate websites, intranets, or customer portals may face data breaches, reputational damage, and operational disruption. Given WordPress’s widespread use across Europe, especially in small to medium enterprises and public sector websites, the attack surface is significant. The vulnerability is particularly critical for sites that have not completed plugin configuration, a common scenario during deployment or updates. Attackers could exploit this to bypass multi-factor authentication or other security controls implemented at the WordPress level. Additionally, compromised administrator accounts could be used to launch further attacks such as ransomware or supply chain compromises. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score and ease of exploitation indicate a high likelihood of future attacks targeting vulnerable European entities.

Mitigation Recommendations

1. Immediately verify that the OwnID Passwordless Login plugin is fully configured, ensuring the ownid_shared_secret is properly set and not empty. 2. If configuration cannot be confirmed or completed, disable or uninstall the plugin until a patched version is released. 3. Monitor WordPress login logs for unusual or unauthorized login attempts, especially those bypassing normal authentication flows. 4. Restrict access to WordPress administrative interfaces using IP whitelisting or VPNs to reduce exposure. 5. Implement additional layers of authentication such as multi-factor authentication (MFA) at the WordPress or web server level. 6. Keep WordPress core, plugins, and themes updated to the latest versions to reduce the risk of chained vulnerabilities. 7. Conduct security audits on WordPress configurations to detect incomplete setups or insecure defaults. 8. Prepare incident response plans specific to WordPress compromises, including backup and recovery strategies. 9. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available. 10. Consider alternative passwordless authentication solutions with proven security records if immediate mitigation is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-11T19:57:38.707Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ef5c7cc4f69c9730e56974

Added to database: 10/15/2025, 8:34:04 AM

Last enriched: 1/5/2026, 11:07:57 AM

Last updated: 1/18/2026, 9:12:52 AM

Views: 135

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats