CVE-2025-10299: CWE-862 Missing Authorization in hakik WPBifröst – Instant Passwordless Temporary Login Links
The WPBifröst – Instant Passwordless Temporary Login Links plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ctl_create_link AJAX action in all versions up to, and including, 1.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new administrative user accounts and subsequently log in as those.
AI Analysis
Technical Summary
CVE-2025-10299 affects the WPBifröst – Instant Passwordless Temporary Login Links plugin for WordPress, which facilitates passwordless login via temporary links. The vulnerability arises from a missing authorization check (CWE-862) on the ctl_create_link AJAX action endpoint. This endpoint is intended to generate temporary login links but lacks proper capability verification, allowing any authenticated user with Subscriber-level privileges or higher to invoke it. By exploiting this flaw, an attacker can create new administrative user accounts without restrictions. Since WordPress roles like Subscriber are commonly assigned to low-privilege users, this vulnerability effectively bypasses intended access controls and escalates privileges to full administrator rights. The vulnerability affects all versions up to and including 1.0.7 of the plugin. The CVSS v3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, required privileges at the low level, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or fixes have been linked yet, and no known exploits have been reported in the wild as of the publication date. However, the vulnerability’s nature makes it a critical threat to WordPress sites using this plugin, as attackers can fully compromise site control remotely once authenticated.
Potential Impact
The impact of CVE-2025-10299 is severe for organizations using the WPBifröst plugin on WordPress sites. Attackers with minimal authenticated access (Subscriber role) can escalate privileges to administrator, enabling them to create new admin accounts, modify site content, install malicious plugins or backdoors, steal sensitive data, and disrupt site availability. This can lead to complete site takeover, data breaches, defacement, and loss of trust. For businesses relying on WordPress for e-commerce, content management, or customer engagement, such compromise can cause financial loss, reputational damage, and regulatory penalties. The vulnerability’s network accessibility and lack of user interaction requirements increase the risk of automated exploitation and widespread attacks once discovered. Organizations with large user bases or multi-user WordPress environments are particularly at risk, as any low-privilege user account can be leveraged for exploitation.
Mitigation Recommendations
To mitigate CVE-2025-10299, organizations should immediately audit their WordPress installations for the presence of the WPBifröst plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. If the plugin is essential, restrict access to authenticated users by implementing additional access controls or web application firewall (WAF) rules that block unauthorized AJAX requests to ctl_create_link. Monitoring logs for suspicious AJAX activity related to this endpoint can help detect exploitation attempts. Additionally, review user roles and permissions to minimize the number of users with Subscriber or higher privileges, and enforce strong authentication mechanisms to reduce the risk of compromised accounts. Once a patch is available, apply it promptly. Regular backups and incident response plans should be in place to recover from potential compromises.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-10299: CWE-862 Missing Authorization in hakik WPBifröst – Instant Passwordless Temporary Login Links
Description
The WPBifröst – Instant Passwordless Temporary Login Links plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ctl_create_link AJAX action in all versions up to, and including, 1.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new administrative user accounts and subsequently log in as those.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10299 affects the WPBifröst – Instant Passwordless Temporary Login Links plugin for WordPress, which facilitates passwordless login via temporary links. The vulnerability arises from a missing authorization check (CWE-862) on the ctl_create_link AJAX action endpoint. This endpoint is intended to generate temporary login links but lacks proper capability verification, allowing any authenticated user with Subscriber-level privileges or higher to invoke it. By exploiting this flaw, an attacker can create new administrative user accounts without restrictions. Since WordPress roles like Subscriber are commonly assigned to low-privilege users, this vulnerability effectively bypasses intended access controls and escalates privileges to full administrator rights. The vulnerability affects all versions up to and including 1.0.7 of the plugin. The CVSS v3.1 base score is 8.8 (high), reflecting network attack vector, low attack complexity, required privileges at the low level, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or fixes have been linked yet, and no known exploits have been reported in the wild as of the publication date. However, the vulnerability’s nature makes it a critical threat to WordPress sites using this plugin, as attackers can fully compromise site control remotely once authenticated.
Potential Impact
The impact of CVE-2025-10299 is severe for organizations using the WPBifröst plugin on WordPress sites. Attackers with minimal authenticated access (Subscriber role) can escalate privileges to administrator, enabling them to create new admin accounts, modify site content, install malicious plugins or backdoors, steal sensitive data, and disrupt site availability. This can lead to complete site takeover, data breaches, defacement, and loss of trust. For businesses relying on WordPress for e-commerce, content management, or customer engagement, such compromise can cause financial loss, reputational damage, and regulatory penalties. The vulnerability’s network accessibility and lack of user interaction requirements increase the risk of automated exploitation and widespread attacks once discovered. Organizations with large user bases or multi-user WordPress environments are particularly at risk, as any low-privilege user account can be leveraged for exploitation.
Mitigation Recommendations
To mitigate CVE-2025-10299, organizations should immediately audit their WordPress installations for the presence of the WPBifröst plugin and verify the version in use. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate the attack surface. If the plugin is essential, restrict access to authenticated users by implementing additional access controls or web application firewall (WAF) rules that block unauthorized AJAX requests to ctl_create_link. Monitoring logs for suspicious AJAX activity related to this endpoint can help detect exploitation attempts. Additionally, review user roles and permissions to minimize the number of users with Subscriber or higher privileges, and enforce strong authentication mechanisms to reduce the risk of compromised accounts. Once a patch is available, apply it promptly. Regular backups and incident response plans should be in place to recover from potential compromises.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-11T20:55:54.797Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ef5c7cc4f69c9730e56978
Added to database: 10/15/2025, 8:34:04 AM
Last enriched: 2/27/2026, 6:19:14 PM
Last updated: 3/26/2026, 8:04:46 AM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.