Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11522: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Elated-Themes Search & Go - Directory WordPress Theme

0
Critical
VulnerabilityCVE-2025-11522cvecve-2025-11522cwe-288
Published: Thu Oct 09 2025 (10/09/2025, 07:23:51 UTC)
Source: CVE Database V5
Vendor/Project: Elated-Themes
Product: Search & Go - Directory WordPress Theme

Description

The Search & Go - Directory WordPress Theme theme for WordPress is vulnerable to Authentication Bypass via account takeover in all versions up to, and including, 2.7. This is due to insufficient user validation in the search_and_go_elated_check_facebook_user() function This makes it possible for unauthenticated attackers to gain access to other user's accounts, including administrators, when Facebook login is enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:06:54 UTC

Technical Analysis

CVE-2025-11522 is a critical authentication bypass vulnerability classified under CWE-288, affecting the Search & Go - Directory WordPress Theme by Elated-Themes, specifically all versions up to and including 2.7. The root cause is insufficient user validation in the function search_and_go_elated_check_facebook_user(), which is responsible for verifying Facebook login credentials. This flaw allows unauthenticated attackers to bypass normal authentication mechanisms and gain unauthorized access to other users' accounts, including those with administrative privileges. The vulnerability is exploitable remotely without requiring any prior authentication or user interaction, making it highly dangerous. The attack vector is network-based, and the scope is unchanged, meaning the vulnerability affects only the vulnerable theme installations but can fully compromise those systems. The CVSS v3.1 base score is 9.8, indicating critical severity with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the simplicity of exploitation and the potential for complete site takeover make this a high-priority threat. The vulnerability specifically impacts WordPress sites using the Search & Go theme with Facebook login enabled, a common configuration for directory and listing websites. The lack of an official patch at the time of disclosure increases the urgency for mitigation. The vulnerability highlights the risks of third-party theme integrations with social login features when proper validation is not enforced.

Potential Impact

The impact of CVE-2025-11522 is severe for organizations running WordPress sites with the Search & Go - Directory theme and Facebook login enabled. Successful exploitation results in full account takeover, including administrative accounts, allowing attackers to manipulate site content, steal sensitive user data, install backdoors, or disrupt site availability. This can lead to data breaches, reputational damage, loss of customer trust, and potential regulatory penalties depending on the data involved. Since WordPress powers a significant portion of websites globally, and directory themes are often used by businesses, local governments, and service providers, the scope of impact can be broad. Attackers can leverage this vulnerability to pivot into internal networks if the WordPress site is connected to other enterprise systems. The ease of exploitation without authentication or user interaction further amplifies the risk, making automated mass scanning and exploitation plausible once exploit code becomes available. Organizations that rely on Facebook login for user convenience are particularly vulnerable, as disabling this feature may be the only immediate mitigation before patches are released.

Mitigation Recommendations

1. Immediately disable Facebook login functionality in the Search & Go theme until a security patch is released by Elated-Themes. 2. Monitor authentication logs for unusual login patterns or multiple failed attempts that could indicate exploitation attempts. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the vulnerable function or Facebook login endpoints. 4. Restrict administrative access by IP whitelisting or multi-factor authentication to reduce the impact of compromised accounts. 5. Regularly audit user accounts for unauthorized changes or new administrative users. 6. Keep WordPress core, plugins, and themes updated and subscribe to vendor security advisories for timely patch application. 7. If possible, temporarily disable or limit Facebook login integration site-wide or replace it with alternative authentication methods. 8. Conduct penetration testing focused on authentication mechanisms to identify similar weaknesses. 9. Prepare incident response plans to quickly isolate and remediate compromised systems if exploitation is detected. 10. Educate site administrators about the risks of social login features and the importance of strict validation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-08T19:02:40.089Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e766774454a62ee99e89df

Added to database: 10/9/2025, 7:38:31 AM

Last enriched: 2/27/2026, 7:06:54 PM

Last updated: 3/28/2026, 9:09:02 AM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses