Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15096: CWE-639 Authorization Bypass Through User-Controlled Key in kamleshyadav Videospirecore Theme Plugin

0
High
VulnerabilityCVE-2025-15096cvecve-2025-15096cwe-639
Published: Wed Feb 11 2026 (02/11/2026, 09:49:23 UTC)
Source: CVE Database V5
Vendor/Project: kamleshyadav
Product: Videospirecore Theme Plugin

Description

The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

AI-Powered Analysis

AILast updated: 02/11/2026, 10:15:32 UTC

Technical Analysis

The Videospirecore Theme Plugin for WordPress, developed by kamleshyadav, suffers from a critical authorization bypass vulnerability identified as CVE-2025-15096. This vulnerability stems from improper validation of user identity when updating user details such as email addresses. Specifically, the plugin fails to verify that the authenticated user has the right to modify the email address of the targeted account. Consequently, any authenticated user with at least Subscriber-level privileges can change the email address of any user, including administrators. Since WordPress uses email addresses as a key factor in password reset workflows, an attacker can leverage this flaw to initiate password resets for targeted accounts, effectively taking over those accounts. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key) and affects all versions of the plugin up to 1.0.6. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the ease of exploitation and potential for full site compromise. The lack of available patches at the time of reporting necessitates immediate attention from site administrators using this plugin.

Potential Impact

For European organizations, this vulnerability presents a substantial risk to WordPress-based websites, particularly those using the Videospirecore Theme Plugin. Successful exploitation can lead to unauthorized administrative access, enabling attackers to manipulate site content, deploy malware, steal sensitive data, or disrupt services. This can result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. E-commerce platforms, government portals, and media outlets relying on WordPress are especially vulnerable to operational disruption and loss of customer trust. The ease of exploitation from a low-privilege account increases the threat landscape, as attackers may gain initial access through phishing or other means and then escalate privileges via this flaw. The absence of known exploits currently offers a window for proactive mitigation, but the high severity score underscores the urgency of addressing this issue to prevent potential widespread abuse across European digital infrastructures.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the Videospirecore Theme Plugin and its version. Until an official patch is released, administrators should consider the following specific mitigations: 1) Restrict plugin usage by disabling or removing the Videospirecore Theme Plugin if not essential; 2) Implement strict role-based access controls to limit Subscriber-level user creation and monitor for unusual privilege escalations; 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to modify user email addresses; 4) Monitor logs for anomalous password reset requests and email changes, especially targeting administrator accounts; 5) Enforce multi-factor authentication (MFA) for all administrative users to reduce the impact of compromised credentials; 6) Regularly back up WordPress sites and databases to enable rapid recovery in case of compromise; 7) Stay informed on vendor updates and apply patches immediately upon release. Additionally, consider isolating critical WordPress instances behind VPNs or IP allowlists to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-25T15:05:00.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c536b4b57a58fa18a16a8

Added to database: 2/11/2026, 10:01:15 AM

Last enriched: 2/11/2026, 10:15:32 AM

Last updated: 2/11/2026, 12:11:13 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats