CVE-2025-13615: CWE-639 Authorization Bypass Through User-Controlled Key in phpface StreamTube Core
The StreamTube Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 4.78. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited if the 'registration password fields' enabled in theme options.
AI Analysis
Technical Summary
CVE-2025-13615 is an authorization bypass vulnerability categorized under CWE-639 affecting the StreamTube Core plugin for WordPress, versions up to and including 4.78. The vulnerability stems from the plugin's improper handling of user-controlled keys that grant access to sensitive objects, allowing an attacker to circumvent authorization mechanisms. Specifically, this flaw enables unauthenticated attackers to arbitrarily change user passwords, including those of administrators, by exploiting the 'registration password fields' feature if it is enabled in the theme options. The vulnerability does not require any authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can fully compromise the affected WordPress site, leading to complete takeover, data theft, or site defacement. No official patches or fixes have been linked yet, so mitigation currently relies on disabling the vulnerable feature or applying vendor updates once available. The vulnerability was publicly disclosed on November 30, 2025, and is tracked by the CVE database with no known active exploits reported at this time.
Potential Impact
For European organizations, the impact of CVE-2025-13615 is significant due to the widespread use of WordPress as a content management system across various sectors including government, education, media, and commerce. Successful exploitation allows attackers to change passwords of any user, including administrators, leading to full site compromise. This can result in unauthorized data access, data breaches involving personal or sensitive information protected under GDPR, defacement of public-facing websites, disruption of services, and potential use of compromised sites as launchpads for further attacks. The ability to bypass authorization without authentication increases the risk of automated mass exploitation campaigns targeting vulnerable WordPress installations. Organizations relying on StreamTube Core for video content or media delivery are particularly at risk. The breach of administrator accounts can also lead to persistent backdoors and long-term compromise, complicating incident response and recovery efforts. Given the critical severity and ease of exploitation, European entities must act swiftly to mitigate this threat to protect their digital assets and maintain regulatory compliance.
Mitigation Recommendations
1. Immediately verify if the 'registration password fields' feature is enabled in the theme options of any WordPress sites using StreamTube Core plugin and disable it if not essential. 2. Monitor official phpface and WordPress plugin repositories for patches or updates addressing CVE-2025-13615 and apply them promptly once released. 3. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to exploit user-controlled key parameters related to this vulnerability. 4. Conduct thorough audits of user accounts and reset passwords for all users, especially administrators, on affected sites to mitigate potential unauthorized changes. 5. Employ multi-factor authentication (MFA) for WordPress admin accounts to reduce the impact of compromised credentials. 6. Regularly back up WordPress sites and databases to enable rapid restoration in case of compromise. 7. Restrict access to WordPress admin interfaces by IP whitelisting or VPN where feasible to reduce exposure. 8. Educate site administrators about this vulnerability and encourage vigilance for unusual login or password change activities. 9. Use security plugins that can detect unauthorized changes or suspicious behavior within WordPress environments. 10. Maintain an incident response plan tailored for web application compromises to ensure swift containment and remediation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-13615: CWE-639 Authorization Bypass Through User-Controlled Key in phpface StreamTube Core
Description
The StreamTube Core plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 4.78. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note: This can only be exploited if the 'registration password fields' enabled in theme options.
AI-Powered Analysis
Technical Analysis
CVE-2025-13615 is an authorization bypass vulnerability categorized under CWE-639 affecting the StreamTube Core plugin for WordPress, versions up to and including 4.78. The vulnerability stems from the plugin's improper handling of user-controlled keys that grant access to sensitive objects, allowing an attacker to circumvent authorization mechanisms. Specifically, this flaw enables unauthenticated attackers to arbitrarily change user passwords, including those of administrators, by exploiting the 'registration password fields' feature if it is enabled in the theme options. The vulnerability does not require any authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can fully compromise the affected WordPress site, leading to complete takeover, data theft, or site defacement. No official patches or fixes have been linked yet, so mitigation currently relies on disabling the vulnerable feature or applying vendor updates once available. The vulnerability was publicly disclosed on November 30, 2025, and is tracked by the CVE database with no known active exploits reported at this time.
Potential Impact
For European organizations, the impact of CVE-2025-13615 is significant due to the widespread use of WordPress as a content management system across various sectors including government, education, media, and commerce. Successful exploitation allows attackers to change passwords of any user, including administrators, leading to full site compromise. This can result in unauthorized data access, data breaches involving personal or sensitive information protected under GDPR, defacement of public-facing websites, disruption of services, and potential use of compromised sites as launchpads for further attacks. The ability to bypass authorization without authentication increases the risk of automated mass exploitation campaigns targeting vulnerable WordPress installations. Organizations relying on StreamTube Core for video content or media delivery are particularly at risk. The breach of administrator accounts can also lead to persistent backdoors and long-term compromise, complicating incident response and recovery efforts. Given the critical severity and ease of exploitation, European entities must act swiftly to mitigate this threat to protect their digital assets and maintain regulatory compliance.
Mitigation Recommendations
1. Immediately verify if the 'registration password fields' feature is enabled in the theme options of any WordPress sites using StreamTube Core plugin and disable it if not essential. 2. Monitor official phpface and WordPress plugin repositories for patches or updates addressing CVE-2025-13615 and apply them promptly once released. 3. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to exploit user-controlled key parameters related to this vulnerability. 4. Conduct thorough audits of user accounts and reset passwords for all users, especially administrators, on affected sites to mitigate potential unauthorized changes. 5. Employ multi-factor authentication (MFA) for WordPress admin accounts to reduce the impact of compromised credentials. 6. Regularly back up WordPress sites and databases to enable rapid restoration in case of compromise. 7. Restrict access to WordPress admin interfaces by IP whitelisting or VPN where feasible to reduce exposure. 8. Educate site administrators about this vulnerability and encourage vigilance for unusual login or password change activities. 9. Use security plugins that can detect unauthorized changes or suspicious behavior within WordPress environments. 10. Maintain an incident response plan tailored for web application compromises to ensure swift containment and remediation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-24T18:46:54.192Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 692ba718b00568eef09a0bbf
Added to database: 11/30/2025, 2:08:24 AM
Last enriched: 12/7/2025, 4:28:56 AM
Last updated: 1/14/2026, 9:30:21 AM
Views: 211
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0813: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prasannasp Short Link
MediumCVE-2026-0812: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in guillaumev LinkedIn SC
MediumCVE-2026-0741: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in electric-studio Electric Studio Download Counter
MediumCVE-2026-0739: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webbu WMF Mobile Redirector
MediumCVE-2026-0734: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dfieldfl WP Allowed Hosts
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.