CVE-2025-10305: CWE-862 Missing Authorization in endisha Secure Passkeys
The Secure Passkeys plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_passkey() and passkeys_list() function in all versions up to, and including, 1.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view and delete passkeys.
AI Analysis
Technical Summary
CVE-2025-10305 is a vulnerability identified in the Secure Passkeys plugin developed by endisha for WordPress, present in all versions up to and including 1.2.1. The root cause is a missing authorization check (CWE-862) in two critical functions: delete_passkey() and passkeys_list(). These functions are responsible for managing passkeys, which are used for authentication purposes. Due to the lack of proper capability checks, any authenticated user with Subscriber-level access or higher can invoke these functions to view the list of passkeys and delete them arbitrarily. This bypasses intended access controls that should restrict such sensitive operations to administrators or trusted roles. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (via the WordPress interface). Although confidentiality of passkeys is not compromised (no direct data leakage reported), the integrity of authentication credentials is at risk because attackers can delete passkeys, potentially disrupting legitimate user access or enabling further attacks through account lockout or social engineering. The vulnerability has a CVSS v3.1 base score of 5.3, categorized as medium severity, reflecting its moderate impact and ease of exploitation. No patches or fixes have been published at the time of disclosure, and there are no known exploits in the wild. The vulnerability was reserved and published in September 2025 by Wordfence, a reputable security vendor. This issue highlights the importance of enforcing strict authorization checks in plugins managing authentication mechanisms.
Potential Impact
The primary impact of CVE-2025-10305 is on the integrity of authentication credentials within WordPress sites using the Secure Passkeys plugin. Attackers with Subscriber-level access can delete passkeys, potentially locking out legitimate users or administrators, causing denial of access or forcing password resets. This can disrupt normal operations, especially for sites relying heavily on passkeys for authentication. While confidentiality is not directly affected, the ability to manipulate authentication credentials undermines trust in the authentication system and could facilitate further attacks such as account takeover or privilege escalation if combined with other vulnerabilities. Organizations with multiple users at Subscriber level or higher are at greater risk. Since WordPress powers a significant portion of the web, including many business and e-commerce sites, the vulnerability could lead to operational disruptions, increased support costs, and reputational damage. The lack of a patch increases exposure time, and attackers could weaponize this flaw once exploit code becomes available. The vulnerability does not affect availability directly but can indirectly cause service interruptions due to authentication issues.
Mitigation Recommendations
Until an official patch is released, organizations should implement the following mitigations: 1) Restrict Subscriber-level user accounts by reviewing and minimizing the number of users with this role, especially on sites using the Secure Passkeys plugin. 2) Temporarily disable or uninstall the Secure Passkeys plugin if it is not critical to operations or if alternative authentication methods are available. 3) Implement additional access control measures such as web application firewalls (WAFs) to monitor and block suspicious requests targeting passkey management endpoints. 4) Monitor WordPress user activity logs for unusual access patterns or unauthorized attempts to delete passkeys. 5) Educate site administrators about the risk and encourage prompt updates once a patch is available. 6) Consider applying custom code or filters to enforce capability checks on the affected functions if feasible. 7) Regularly back up authentication data and site configurations to enable recovery in case of malicious deletions. These steps go beyond generic advice by focusing on role management, plugin control, and proactive monitoring specific to this vulnerability.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan, South Korea
CVE-2025-10305: CWE-862 Missing Authorization in endisha Secure Passkeys
Description
The Secure Passkeys plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_passkey() and passkeys_list() function in all versions up to, and including, 1.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view and delete passkeys.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10305 is a vulnerability identified in the Secure Passkeys plugin developed by endisha for WordPress, present in all versions up to and including 1.2.1. The root cause is a missing authorization check (CWE-862) in two critical functions: delete_passkey() and passkeys_list(). These functions are responsible for managing passkeys, which are used for authentication purposes. Due to the lack of proper capability checks, any authenticated user with Subscriber-level access or higher can invoke these functions to view the list of passkeys and delete them arbitrarily. This bypasses intended access controls that should restrict such sensitive operations to administrators or trusted roles. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (via the WordPress interface). Although confidentiality of passkeys is not compromised (no direct data leakage reported), the integrity of authentication credentials is at risk because attackers can delete passkeys, potentially disrupting legitimate user access or enabling further attacks through account lockout or social engineering. The vulnerability has a CVSS v3.1 base score of 5.3, categorized as medium severity, reflecting its moderate impact and ease of exploitation. No patches or fixes have been published at the time of disclosure, and there are no known exploits in the wild. The vulnerability was reserved and published in September 2025 by Wordfence, a reputable security vendor. This issue highlights the importance of enforcing strict authorization checks in plugins managing authentication mechanisms.
Potential Impact
The primary impact of CVE-2025-10305 is on the integrity of authentication credentials within WordPress sites using the Secure Passkeys plugin. Attackers with Subscriber-level access can delete passkeys, potentially locking out legitimate users or administrators, causing denial of access or forcing password resets. This can disrupt normal operations, especially for sites relying heavily on passkeys for authentication. While confidentiality is not directly affected, the ability to manipulate authentication credentials undermines trust in the authentication system and could facilitate further attacks such as account takeover or privilege escalation if combined with other vulnerabilities. Organizations with multiple users at Subscriber level or higher are at greater risk. Since WordPress powers a significant portion of the web, including many business and e-commerce sites, the vulnerability could lead to operational disruptions, increased support costs, and reputational damage. The lack of a patch increases exposure time, and attackers could weaponize this flaw once exploit code becomes available. The vulnerability does not affect availability directly but can indirectly cause service interruptions due to authentication issues.
Mitigation Recommendations
Until an official patch is released, organizations should implement the following mitigations: 1) Restrict Subscriber-level user accounts by reviewing and minimizing the number of users with this role, especially on sites using the Secure Passkeys plugin. 2) Temporarily disable or uninstall the Secure Passkeys plugin if it is not critical to operations or if alternative authentication methods are available. 3) Implement additional access control measures such as web application firewalls (WAFs) to monitor and block suspicious requests targeting passkey management endpoints. 4) Monitor WordPress user activity logs for unusual access patterns or unauthorized attempts to delete passkeys. 5) Educate site administrators about the risk and encourage prompt updates once a patch is available. 6) Consider applying custom code or filters to enforce capability checks on the affected functions if feasible. 7) Regularly back up authentication data and site configurations to enable recovery in case of malicious deletions. These steps go beyond generic advice by focusing on role management, plugin control, and proactive monitoring specific to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-11T22:04:22.079Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68cf42444a0b186b9321b040
Added to database: 9/21/2025, 12:09:40 AM
Last enriched: 2/27/2026, 6:21:05 PM
Last updated: 3/26/2026, 9:18:03 AM
Views: 182
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.