Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13613: CWE-289 Authentication Bypass by Alternate Name in Elated Themes Elated Membership

0
Critical
VulnerabilityCVE-2025-13613cvecve-2025-13613cwe-289
Published: Wed Dec 10 2025 (12/10/2025, 01:51:52 UTC)
Source: CVE Database V5
Vendor/Project: Elated Themes
Product: Elated Membership

Description

The Elated Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.2. This is due to the plugin not properly logging in a user with the data that was previously verified through the 'eltdf_membership_check_facebook_user' and the 'eltdf_membership_login_user_from_social_network' function. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.

AI-Powered Analysis

AILast updated: 12/17/2025, 04:53:23 UTC

Technical Analysis

CVE-2025-13613 is an authentication bypass vulnerability classified under CWE-289 affecting the Elated Membership plugin for WordPress, versions up to and including 1.2. The vulnerability stems from improper handling of user authentication in the plugin's social login functions 'eltdf_membership_check_facebook_user' and 'eltdf_membership_login_user_from_social_network'. Specifically, the plugin fails to properly log in users based on previously verified social network data, allowing attackers to bypass authentication checks. An attacker with an existing user account on the site—which can be created via the plugin's default temporary user functionality—and access to the administrative user's email can exploit this flaw to log in as an administrator without valid credentials. This bypass does not require user interaction and can be exploited remotely over the network. The vulnerability impacts confidentiality, integrity, and availability, as attackers can gain full administrative control, potentially leading to data theft, site manipulation, or denial of service. The CVSS v3.1 base score is 9.8 (critical), reflecting the ease of exploitation (no privileges or user interaction required) and the severe impact. No patches or known exploits are currently reported, but the risk is high given the plugin's functionality and integration with WordPress sites. The vulnerability highlights a critical failure in the plugin's authentication logic, especially in handling social network login flows, which should always include robust verification before granting elevated privileges.

Potential Impact

For European organizations, the impact of this vulnerability is substantial. Many businesses and institutions rely on WordPress for their web presence, and plugins like Elated Membership are commonly used to manage user memberships and social logins. Exploitation could allow attackers to gain administrative access, leading to unauthorized data access, modification, or deletion, and potentially the deployment of malware or ransomware. This could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. Organizations with sensitive or regulated data are particularly at risk. The requirement for access to the administrative user's email increases the attack complexity but also highlights the importance of email account security. Given the critical severity, exploitation could lead to full site compromise, impacting service availability and trustworthiness of affected organizations.

Mitigation Recommendations

1. Immediately audit all WordPress sites using the Elated Membership plugin and identify versions up to 1.2. 2. Disable or remove the plugin until an official patch or update is released by Elated Themes. 3. Enforce strong email security measures for administrative accounts, including multi-factor authentication (MFA) and monitoring for suspicious access. 4. Restrict or disable the temporary user creation functionality if possible to reduce the attack surface. 5. Monitor logs for unusual login attempts, especially those involving social network authentication flows. 6. Implement Web Application Firewalls (WAF) with rules to detect and block suspicious authentication bypass attempts. 7. Educate administrators about phishing risks targeting their email accounts, as email access is a prerequisite for exploitation. 8. Once a patch is available, promptly apply it and verify the fix through testing. 9. Consider additional hardening of WordPress installations, such as limiting administrative user privileges and using security plugins that monitor authentication anomalies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-24T17:18:21.090Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6938de9abc985c89a3dc30ac

Added to database: 12/10/2025, 2:44:42 AM

Last enriched: 12/17/2025, 4:53:23 AM

Last updated: 2/8/2026, 1:34:28 AM

Views: 196

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats