Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10294: CWE-288 Authentication Bypass Using an Alternate Path or Channel in victornavarro OwnID Passwordless Login

0
Critical
VulnerabilityCVE-2025-10294cvecve-2025-10294cwe-288
Published: Wed Oct 15 2025 (10/15/2025, 08:26:01 UTC)
Source: CVE Database V5
Vendor/Project: victornavarro
Product: OwnID Passwordless Login

Description

The OwnID Passwordless Login plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.3.4. This is due to the plugin not properly checking if the ownid_shared_secret value is empty prior to authenticating a user via JWT. This makes it possible for unauthenticated attackers to log in as other users, including administrators, on instances where the plugin has not been fully configured yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 18:18:36 UTC

Technical Analysis

The OwnID Passwordless Login plugin for WordPress, up to and including version 1.3.4, contains a critical authentication bypass vulnerability identified as CVE-2025-10294. This vulnerability stems from improper validation of the ownid_shared_secret parameter during JWT-based authentication. Specifically, the plugin does not check whether the ownid_shared_secret is empty before proceeding with user authentication. As a result, an unauthenticated attacker can exploit this flaw to bypass authentication controls and gain access to any user account, including those with administrative privileges. The vulnerability is classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel). The attack vector is network-based with no required privileges or user interaction, making exploitation straightforward. The vulnerability affects all versions of the plugin up to 1.3.4, and no patches or updates are currently linked, indicating that users must take immediate protective actions. Although no active exploits have been reported in the wild, the potential for full site compromise is high given the nature of the flaw and the critical CVSS score of 9.8. This vulnerability threatens the confidentiality, integrity, and availability of WordPress sites using this plugin, potentially allowing attackers to manipulate site content, steal sensitive data, or disrupt services.

Potential Impact

The impact of CVE-2025-10294 is severe for organizations worldwide that use the OwnID Passwordless Login plugin on their WordPress sites. Successful exploitation allows attackers to bypass authentication entirely and assume the identity of any user, including administrators. This can lead to complete site takeover, enabling attackers to modify or delete content, steal sensitive information, inject malicious code, or deploy further attacks such as ransomware or phishing campaigns. The compromise of administrative accounts can also facilitate persistent backdoors and lateral movement within connected systems. Given WordPress's widespread use for business, government, and personal websites, the vulnerability poses a significant risk to data confidentiality, system integrity, and service availability. Organizations relying on this plugin without proper mitigation are exposed to potential reputational damage, financial loss, and regulatory penalties due to data breaches or service disruptions.

Mitigation Recommendations

To mitigate CVE-2025-10294, organizations should immediately disable the OwnID Passwordless Login plugin until a secure patched version is released. If disabling is not feasible, restrict access to the WordPress admin interface and login endpoints using IP whitelisting or web application firewall (WAF) rules to block unauthorized requests. Monitor authentication logs for unusual login attempts or successful logins from unexpected IP addresses. Implement multi-factor authentication (MFA) on WordPress accounts to add an additional layer of security beyond the vulnerable plugin. Regularly update all WordPress plugins and core installations to the latest versions once a patch for this vulnerability becomes available. Additionally, conduct a thorough security audit and incident response readiness to detect and remediate any potential compromise resulting from this vulnerability. Consider isolating critical WordPress instances in segmented network zones to limit the blast radius of any exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-11T19:57:38.707Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ef5c7cc4f69c9730e56974

Added to database: 10/15/2025, 8:34:04 AM

Last enriched: 2/27/2026, 6:18:36 PM

Last updated: 3/24/2026, 1:34:52 PM

Views: 178

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses