Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14440: CWE-565 Reliance on Cookies without Validation and Integrity Checking in jayarsiech JAY Login & Register

0
Critical
VulnerabilityCVE-2025-14440cvecve-2025-14440cwe-565
Published: Sat Dec 13 2025 (12/13/2025, 04:31:30 UTC)
Source: CVE Database V5
Vendor/Project: jayarsiech
Product: JAY Login & Register

Description

The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.

AI-Powered Analysis

AILast updated: 12/13/2025, 05:00:34 UTC

Technical Analysis

CVE-2025-14440 affects the JAY Login & Register plugin for WordPress, specifically versions up to and including 2.4.01. The vulnerability stems from the plugin's 'jay_login_register_process_switch_back' function, which relies on a cookie value for authentication decisions without proper validation or integrity checks (CWE-565). This design flaw allows an unauthenticated attacker who can supply a crafted 'jay_login_register_process_switch_back' cookie with a valid user ID to bypass authentication controls entirely. Consequently, the attacker can log in as any user on the site, including administrators, gaining full control over the WordPress installation. The vulnerability is remotely exploitable over the network without any privileges or user interaction, making it highly dangerous. The CVSS 3.1 base score of 9.8 reflects critical impact across confidentiality, integrity, and availability, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). Although no known exploits are currently in the wild, the simplicity of exploitation and the widespread use of WordPress and its plugins make this a high-priority threat. The lack of available patches at the time of disclosure increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a severe risk to WordPress-based websites and applications using the JAY Login & Register plugin. Successful exploitation results in complete compromise of affected sites, allowing attackers to access sensitive data, modify content, deploy malware, or pivot within the network. This can lead to data breaches, reputational damage, regulatory non-compliance (e.g., GDPR violations), and service disruptions. Organizations in sectors such as government, finance, healthcare, and e-commerce are particularly vulnerable due to the critical nature of their web assets. The ease of exploitation and lack of authentication requirements mean attackers can operate stealthily and remotely, increasing the likelihood of targeted or opportunistic attacks. Additionally, compromised administrative accounts can facilitate further lateral movement and persistent access, amplifying the overall impact.

Mitigation Recommendations

Immediate mitigation steps include disabling or uninstalling the JAY Login & Register plugin until a vendor patch is released. Organizations should monitor their WordPress user accounts for suspicious logins or unauthorized changes. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block requests containing suspicious 'jay_login_register_process_switch_back' cookie values can reduce exposure. Restricting access to the WordPress admin interface by IP whitelisting or VPN-only access can limit attacker reach. Regularly auditing installed plugins and promptly applying security updates is essential. If patching is delayed, consider deploying multi-factor authentication (MFA) on WordPress accounts to add an additional layer of security, although this may not fully mitigate the bypass. Logging and alerting on unusual authentication events should be enhanced to detect exploitation attempts early. Finally, organizations should review user ID enumeration risks, as knowledge of valid user IDs is required for exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T12:22:08.723Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef65d977419e584a508b

Added to database: 12/13/2025, 4:45:25 AM

Last enriched: 12/13/2025, 5:00:34 AM

Last updated: 12/13/2025, 8:59:22 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats