Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10299: CWE-862 Missing Authorization in hakik WPBifröst – Instant Passwordless Temporary Login Links

0
High
VulnerabilityCVE-2025-10299cvecve-2025-10299cwe-862
Published: Wed Oct 15 2025 (10/15/2025, 08:25:55 UTC)
Source: CVE Database V5
Vendor/Project: hakik
Product: WPBifröst – Instant Passwordless Temporary Login Links

Description

The WPBifröst – Instant Passwordless Temporary Login Links plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ctl_create_link AJAX action in all versions up to, and including, 1.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new administrative user accounts and subsequently log in as those.

AI-Powered Analysis

AILast updated: 10/15/2025, 08:50:50 UTC

Technical Analysis

CVE-2025-10299 is a critical privilege escalation vulnerability identified in the WPBifröst – Instant Passwordless Temporary Login Links plugin for WordPress, affecting all versions up to and including 1.0.7. The root cause is a missing authorization check on the ctl_create_link AJAX action, which fails to verify whether the authenticated user has the necessary capabilities to perform this action. As a result, any authenticated user with Subscriber-level access or higher can invoke this AJAX endpoint to create new administrative user accounts. This bypasses WordPress's standard role-based access controls, allowing attackers to escalate privileges from low-level accounts to full administrator rights. Once administrative access is obtained, attackers can fully compromise the website, including modifying content, installing backdoors, stealing sensitive data, or disrupting service. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication, making it highly dangerous in environments where subscriber or low-level accounts are permitted. The CVSS 3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a significant threat. The vulnerability was reserved in early September 2025 and published in mid-October 2025, but no official patches or updates have been linked yet, indicating that affected sites remain vulnerable until mitigations are applied.

Potential Impact

For European organizations, this vulnerability poses a severe risk to WordPress-based websites, especially those that allow user registrations at Subscriber level or higher. Attackers exploiting this flaw can gain full administrative control, leading to potential data breaches, website defacement, unauthorized data manipulation, and service disruptions. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data exposure), and financial losses. Organizations relying on WordPress for e-commerce, customer portals, or internal communications are particularly vulnerable. The ease of exploitation means that attackers do not need sophisticated skills or social engineering to leverage this vulnerability once they have low-level access. Given the widespread use of WordPress across Europe, the potential attack surface is large, and the impact can extend to critical sectors such as government, finance, healthcare, and media. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the risk of rapid exploitation remains high.

Mitigation Recommendations

1. Immediately restrict access to the ctl_create_link AJAX action by implementing custom capability checks or disabling the AJAX endpoint if not required. 2. Monitor user accounts with Subscriber-level access and above for suspicious activity, particularly unexpected creation of new administrator accounts. 3. Enforce strict user registration policies, including manual approval and multi-factor authentication for elevated roles. 4. Regularly audit WordPress user roles and permissions to detect unauthorized privilege escalations. 5. Apply principle of least privilege by limiting the number of users with elevated access. 6. Once available, promptly update the WPBifröst plugin to a patched version that includes proper authorization checks. 7. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious AJAX requests targeting the vulnerable endpoint. 8. Conduct security awareness training for administrators to recognize signs of compromise. 9. Backup WordPress sites regularly and verify backup integrity to enable rapid recovery if compromise occurs. 10. Consider isolating WordPress instances or using containerization to limit lateral movement in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-11T20:55:54.797Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ef5c7cc4f69c9730e56978

Added to database: 10/15/2025, 8:34:04 AM

Last enriched: 10/15/2025, 8:50:50 AM

Last updated: 10/15/2025, 4:05:31 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats