Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13539: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Elated Themes FindAll Membership

0
Critical
VulnerabilityCVE-2025-13539cvecve-2025-13539cwe-288
Published: Thu Nov 27 2025 (11/27/2025, 04:36:45 UTC)
Source: CVE Database V5
Vendor/Project: Elated Themes
Product: FindAll Membership

Description

The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.4. This is due to the plugin not properly logging in a user with the data that was previously verified through the 'findall_membership_check_facebook_user' and the 'findall_membership_check_google_user' functions. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.

AI-Powered Analysis

AILast updated: 11/27/2025, 04:59:05 UTC

Technical Analysis

The FindAll Membership plugin for WordPress, developed by Elated Themes, suffers from a critical authentication bypass vulnerability identified as CVE-2025-13539. This vulnerability stems from improper handling of user authentication via social login verification functions 'findall_membership_check_facebook_user' and 'findall_membership_check_google_user'. The plugin fails to properly log in users after these checks, allowing an attacker to bypass normal authentication mechanisms. Exploitation requires the attacker to have an existing user account, which can be created through the plugin's temporary user functionality by default, and access to the administrative user's email account. By leveraging these conditions, an attacker can impersonate administrative users without valid credentials or authentication steps. The vulnerability impacts all versions up to and including 1.0.4. The CVSS v3.1 score of 9.8 reflects the vulnerability's critical nature, with network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently in the wild, the ease of exploitation and the potential for complete site takeover make this a severe threat. The lack of available patches necessitates immediate defensive actions by site administrators. This vulnerability highlights the risks of improper authentication logic in plugins that integrate third-party social login mechanisms.

Potential Impact

For European organizations, this vulnerability poses a severe risk of unauthorized administrative access to WordPress sites using the FindAll Membership plugin. Successful exploitation can lead to full site compromise, including data theft, defacement, malware implantation, and disruption of services. Confidential information stored or managed via the site can be exposed or altered, damaging organizational reputation and potentially violating data protection regulations such as GDPR. The ability to bypass authentication without user interaction or privileges increases the likelihood of automated attacks. Organizations relying on this plugin for membership management or subscription services may face operational disruptions and financial losses. Additionally, attackers gaining administrative access could leverage the compromised site as a pivot point for further attacks within the organization's network. The impact is particularly critical for sectors with sensitive data or high regulatory scrutiny, such as finance, healthcare, and e-commerce within Europe.

Mitigation Recommendations

Immediate mitigation steps include disabling the FindAll Membership plugin until a secure patch is released by Elated Themes. If disabling is not feasible, restrict access to administrative accounts by implementing IP whitelisting or multi-factor authentication at the WordPress login level. Review and audit all user accounts created via the plugin's temporary user functionality and remove any suspicious or unverified accounts. Monitor administrative login activity for anomalies, especially logins originating from unusual IP addresses or times. Implement email security best practices to protect administrative email accounts, including enforcing strong passwords and multi-factor authentication, to prevent attackers from leveraging email access. Consider deploying a Web Application Firewall (WAF) with custom rules to detect and block exploitation attempts targeting the vulnerable plugin functions. Stay alert for vendor updates or community patches and apply them promptly. Conduct a thorough security assessment of affected WordPress installations to identify any signs of compromise. Finally, educate site administrators about the risks of social login integrations and the importance of secure plugin management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-22T05:13:16.600Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927d764d4a4bdffcb26cfdb

Added to database: 11/27/2025, 4:45:24 AM

Last enriched: 11/27/2025, 4:59:05 AM

Last updated: 11/27/2025, 11:04:55 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats