Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13390: CWE-303 Incorrect Implementation of Authentication Algorithm in listingthemes WP Directory Kit

0
Critical
VulnerabilityCVE-2025-13390cvecve-2025-13390cwe-303
Published: Wed Dec 03 2025 (12/03/2025, 13:52:44 UTC)
Source: CVE Database V5
Vendor/Project: listingthemes
Product: WP Directory Kit

Description

The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function. This is due to the feature using a cryptographically weak token generation mechanism. This makes it possible for unauthenticated attackers to gain administrative access and achieve full site takeover via the auto-login endpoint with a predictable token.

AI-Powered Analysis

AILast updated: 12/03/2025, 14:22:58 UTC

Technical Analysis

CVE-2025-13390 affects the WP Directory Kit plugin for WordPress, specifically versions up to and including 1.4.4. The vulnerability arises from an incorrect implementation of the authentication algorithm within the wdk_generate_auto_login_link function. This function is responsible for generating auto-login tokens intended to facilitate user authentication without manual login. However, the token generation mechanism is cryptographically weak and predictable, classified under CWE-303 (Incorrect Implementation of Authentication Algorithm). An attacker can exploit this weakness by predicting or forging valid tokens, thereby bypassing authentication controls entirely. This allows unauthenticated attackers to gain administrative privileges on the affected WordPress site, resulting in full site takeover. The vulnerability does not require any user interaction or prior authentication, and the attack vector is remote network access (AV:N). The CVSS v3.1 base score is 10.0, reflecting critical impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction needed. No patches or fixes have been published at the time of disclosure, and no known exploits are publicly available, though the risk remains high due to the nature of the flaw. The vulnerability impacts all installations using the affected plugin versions, which may be embedded in various WordPress deployments, including business, e-commerce, and informational websites.

Potential Impact

For European organizations, this vulnerability poses a severe risk of unauthorized administrative access to WordPress sites using the WP Directory Kit plugin. Successful exploitation can lead to complete site compromise, including data theft, defacement, malware implantation, and disruption of services. Organizations relying on WordPress for customer-facing portals, internal directories, or content management may face significant operational and reputational damage. The breach of administrative credentials can also facilitate lateral movement within networks if the WordPress environment is integrated with internal systems. Given the critical nature of the vulnerability and the widespread use of WordPress across Europe, the potential impact includes regulatory non-compliance (e.g., GDPR violations), financial losses, and erosion of customer trust. The ease of exploitation without authentication or user interaction further exacerbates the threat, making timely mitigation imperative.

Mitigation Recommendations

Immediate mitigation steps include disabling or removing the WP Directory Kit plugin until a secure patched version is released. Organizations should monitor WordPress sites for unusual administrative logins or suspicious activity related to the auto-login feature. Implementing web application firewalls (WAFs) with custom rules to block access to the auto-login endpoint or to detect anomalous token patterns can reduce exposure. Restricting access to the WordPress admin interface by IP whitelisting or VPN-only access can also limit attack surface. Regularly auditing installed plugins and maintaining an inventory of versions will help identify vulnerable instances promptly. Once a patch is available, prioritize its deployment across all affected systems. Additionally, consider implementing multi-factor authentication (MFA) for WordPress admin accounts to add a layer of defense against token-based bypasses. Backup critical data and have incident response plans ready to address potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T21:50:03.589Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6930444551392e1c8b19b53f

Added to database: 12/3/2025, 2:08:05 PM

Last enriched: 12/3/2025, 2:22:58 PM

Last updated: 12/5/2025, 12:01:06 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats