CVE-2025-13390: CWE-303 Incorrect Implementation of Authentication Algorithm in listingthemes WP Directory Kit
The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function. This is due to the feature using a cryptographically weak token generation mechanism. This makes it possible for unauthenticated attackers to gain administrative access and achieve full site takeover via the auto-login endpoint with a predictable token.
AI Analysis
Technical Summary
The WP Directory Kit plugin for WordPress, widely used for directory and listing functionalities, contains a critical vulnerability identified as CVE-2025-13390. The vulnerability stems from an incorrect implementation of the authentication algorithm within the wdk_generate_auto_login_link function. Specifically, the plugin uses a cryptographically weak token generation mechanism to create auto-login links intended for user convenience. However, this weak token is predictable, enabling unauthenticated attackers to craft valid tokens and bypass authentication controls. This flaw allows attackers to gain administrative privileges on the affected WordPress site without any user interaction or prior authentication. The vulnerability affects all versions up to and including 1.4.4, with version 1.4.0 explicitly mentioned. The CVSS v3.1 base score of 10 reflects the critical nature of this flaw, highlighting its network attack vector, low complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no public exploits have been observed in the wild, the ease of exploitation and the potential for full site compromise make this a severe threat. The absence of available patches necessitates immediate risk mitigation by disabling the vulnerable feature or applying strict access controls to the auto-login endpoint. This vulnerability is categorized under CWE-303, which relates to incorrect implementation of authentication algorithms, emphasizing the importance of robust cryptographic practices in security-sensitive functions.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of WordPress for business websites, e-commerce platforms, and public sector portals. Successful exploitation results in full administrative control over the affected site, enabling attackers to modify content, steal sensitive data, deploy malware, or disrupt services. This can lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), financial losses, and operational downtime. The critical nature of the vulnerability means that attackers can remotely compromise sites without any authentication or user interaction, increasing the likelihood of automated mass exploitation campaigns. Organizations relying on WP Directory Kit for directory or listing services are particularly vulnerable, as attackers can manipulate listings or inject malicious content. The impact extends to supply chain risks if compromised sites serve as trusted platforms or integrate with other systems. Given the lack of patches, the window of exposure remains open, necessitating urgent defensive measures.
Mitigation Recommendations
Immediate mitigation steps include disabling the auto-login feature provided by the WP Directory Kit plugin to prevent exploitation of the weak token mechanism. Organizations should restrict access to the auto-login endpoint via web application firewalls (WAFs) or IP whitelisting to limit exposure. Monitoring web server logs for unusual or repeated access attempts to the auto-login URL can help detect exploitation attempts early. Applying strict least-privilege principles to WordPress administrative accounts and enabling multi-factor authentication (MFA) can reduce the impact of potential compromises. Until an official patch is released, consider isolating affected WordPress instances from critical networks and backing up site data regularly to enable recovery. Security teams should also review plugin usage and consider alternative plugins with stronger security postures. Coordinating with WordPress security communities and subscribing to vulnerability advisories will ensure timely updates once patches become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13390: CWE-303 Incorrect Implementation of Authentication Algorithm in listingthemes WP Directory Kit
Description
The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function. This is due to the feature using a cryptographically weak token generation mechanism. This makes it possible for unauthenticated attackers to gain administrative access and achieve full site takeover via the auto-login endpoint with a predictable token.
AI-Powered Analysis
Technical Analysis
The WP Directory Kit plugin for WordPress, widely used for directory and listing functionalities, contains a critical vulnerability identified as CVE-2025-13390. The vulnerability stems from an incorrect implementation of the authentication algorithm within the wdk_generate_auto_login_link function. Specifically, the plugin uses a cryptographically weak token generation mechanism to create auto-login links intended for user convenience. However, this weak token is predictable, enabling unauthenticated attackers to craft valid tokens and bypass authentication controls. This flaw allows attackers to gain administrative privileges on the affected WordPress site without any user interaction or prior authentication. The vulnerability affects all versions up to and including 1.4.4, with version 1.4.0 explicitly mentioned. The CVSS v3.1 base score of 10 reflects the critical nature of this flaw, highlighting its network attack vector, low complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no public exploits have been observed in the wild, the ease of exploitation and the potential for full site compromise make this a severe threat. The absence of available patches necessitates immediate risk mitigation by disabling the vulnerable feature or applying strict access controls to the auto-login endpoint. This vulnerability is categorized under CWE-303, which relates to incorrect implementation of authentication algorithms, emphasizing the importance of robust cryptographic practices in security-sensitive functions.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the widespread use of WordPress for business websites, e-commerce platforms, and public sector portals. Successful exploitation results in full administrative control over the affected site, enabling attackers to modify content, steal sensitive data, deploy malware, or disrupt services. This can lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), financial losses, and operational downtime. The critical nature of the vulnerability means that attackers can remotely compromise sites without any authentication or user interaction, increasing the likelihood of automated mass exploitation campaigns. Organizations relying on WP Directory Kit for directory or listing services are particularly vulnerable, as attackers can manipulate listings or inject malicious content. The impact extends to supply chain risks if compromised sites serve as trusted platforms or integrate with other systems. Given the lack of patches, the window of exposure remains open, necessitating urgent defensive measures.
Mitigation Recommendations
Immediate mitigation steps include disabling the auto-login feature provided by the WP Directory Kit plugin to prevent exploitation of the weak token mechanism. Organizations should restrict access to the auto-login endpoint via web application firewalls (WAFs) or IP whitelisting to limit exposure. Monitoring web server logs for unusual or repeated access attempts to the auto-login URL can help detect exploitation attempts early. Applying strict least-privilege principles to WordPress administrative accounts and enabling multi-factor authentication (MFA) can reduce the impact of potential compromises. Until an official patch is released, consider isolating affected WordPress instances from critical networks and backing up site data regularly to enable recovery. Security teams should also review plugin usage and consider alternative plugins with stronger security postures. Coordinating with WordPress security communities and subscribing to vulnerability advisories will ensure timely updates once patches become available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-18T21:50:03.589Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6930444551392e1c8b19b53f
Added to database: 12/3/2025, 2:08:05 PM
Last enriched: 12/10/2025, 2:40:37 PM
Last updated: 1/17/2026, 9:06:03 PM
Views: 170
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1064: Command Injection in bastillion-io Bastillion
MediumCVE-2026-1063: Command Injection in bastillion-io Bastillion
MediumCVE-2026-1062: Server-Side Request Forgery in xiweicheng TMS
MediumCVE-2026-1061: Unrestricted Upload in xiweicheng TMS
MediumCVE-2026-1050: SQL Injection in risesoft-y9 Digital-Infrastructure
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.