Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11522: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Elated-Themes Search & Go - Directory WordPress Theme

0
Critical
VulnerabilityCVE-2025-11522cvecve-2025-11522cwe-288
Published: Thu Oct 09 2025 (10/09/2025, 07:23:51 UTC)
Source: CVE Database V5
Vendor/Project: Elated-Themes
Product: Search & Go - Directory WordPress Theme

Description

CVE-2025-11522 is a critical authentication bypass vulnerability in the Search & Go - Directory WordPress Theme by Elated-Themes, affecting all versions up to 2. 7. The flaw arises from insufficient validation in the Facebook login integration function, allowing unauthenticated attackers to impersonate other users, including administrators. Exploitation requires no user interaction or privileges and can lead to full account takeover, compromising confidentiality, integrity, and availability of affected sites. Although no known exploits are currently reported in the wild, the high CVSS score (9. 8) reflects the severe risk. European organizations using this theme, especially those relying on Facebook login, face significant risks of unauthorized access and potential data breaches. Mitigation requires immediate theme updates or disabling Facebook login until a patch is available, alongside enhanced monitoring and access controls. Countries with high WordPress adoption and significant use of directory themes, such as Germany, the UK, France, and the Netherlands, are most at risk. Given the ease of exploitation and critical impact, urgent remediation is advised.

AI-Powered Analysis

AILast updated: 10/16/2025, 08:53:56 UTC

Technical Analysis

CVE-2025-11522 is a critical vulnerability classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel) found in the Search & Go - Directory WordPress Theme by Elated-Themes. The vulnerability affects all versions up to and including 2.7 and stems from insufficient user validation within the function search_and_go_elated_check_facebook_user(), which handles Facebook login authentication. This flaw allows unauthenticated attackers to bypass normal authentication mechanisms and assume the identity of other users, including those with administrative privileges, without needing any credentials or user interaction. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly accessible to attackers. Successful exploitation compromises confidentiality, integrity, and availability by granting attackers full control over user accounts, potentially leading to data theft, site defacement, or further malware deployment. Although no public exploits have been reported yet, the vulnerability's nature and high CVSS score (9.8) indicate a significant risk. The lack of an official patch at the time of disclosure necessitates immediate mitigation efforts by site administrators. The vulnerability is particularly relevant to WordPress sites using the Search & Go theme with Facebook login enabled, which is common in directory and listing websites. The technical root cause is a failure to properly validate the authenticity of Facebook user tokens or sessions, allowing attackers to craft requests that impersonate legitimate users.

Potential Impact

For European organizations, this vulnerability poses a severe threat, especially for those operating directory or listing websites using the Search & Go WordPress theme with Facebook login enabled. Successful exploitation can lead to unauthorized access to sensitive user data, including personal information and administrative controls, resulting in data breaches and loss of trust. Attackers gaining admin access can manipulate website content, inject malicious code, or disrupt services, impacting business continuity and reputation. Given the widespread use of WordPress across Europe and the popularity of Facebook login for user convenience, many organizations could be exposed. The breach of administrator accounts could also facilitate lateral movement within corporate networks if the website is integrated with internal systems. Regulatory implications under GDPR are significant, as unauthorized data access could lead to substantial fines and legal consequences. The threat is amplified by the ease of exploitation and the absence of required authentication or user interaction, making automated attacks feasible. Organizations relying on this theme for customer engagement or lead generation may face operational and financial impacts due to downtime or remediation costs.

Mitigation Recommendations

Immediate mitigation steps include disabling Facebook login functionality within the Search & Go theme until an official patch is released by Elated-Themes. Site administrators should monitor user account activity for suspicious logins or changes, especially focusing on administrator accounts. Implementing multi-factor authentication (MFA) for WordPress admin accounts can reduce the risk of account takeover even if authentication bypass occurs. Regular backups of website data and configurations should be maintained to enable rapid recovery in case of compromise. Network-level protections such as Web Application Firewalls (WAFs) should be configured to detect and block anomalous requests targeting the vulnerable function or Facebook login endpoints. Administrators should audit installed plugins and themes to ensure no other components introduce similar risks. Once a patch is available, prompt application is critical. Additionally, organizations should review Facebook app permissions and OAuth configurations to ensure they follow best practices and minimize attack surface. Security awareness training for site administrators about this vulnerability and its exploitation methods can improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-08T19:02:40.089Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e766774454a62ee99e89df

Added to database: 10/9/2025, 7:38:31 AM

Last enriched: 10/16/2025, 8:53:56 AM

Last updated: 11/21/2025, 1:20:48 PM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats