Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15096: CWE-639 Authorization Bypass Through User-Controlled Key in kamleshyadav Videospirecore Theme Plugin

0
High
VulnerabilityCVE-2025-15096cvecve-2025-15096cwe-639
Published: Wed Feb 11 2026 (02/11/2026, 09:49:23 UTC)
Source: CVE Database V5
Vendor/Project: kamleshyadav
Product: Videospirecore Theme Plugin

Description

The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:52:50 UTC

Technical Analysis

CVE-2025-15096 is an authorization bypass vulnerability classified under CWE-639, found in the Videospirecore Theme Plugin for WordPress developed by kamleshyadav. The flaw exists in all versions up to and including 1.0.6, where the plugin fails to properly validate the identity of users attempting to update account details such as email addresses. Authenticated attackers with minimal privileges (Subscriber-level or higher) can exploit this weakness to modify the email addresses of arbitrary users, including administrators. By changing an administrator's email, the attacker can initiate a password reset process, thereby gaining full control over the administrator account. This privilege escalation vector effectively allows attackers to bypass intended access controls and take over high-privilege accounts. The vulnerability is remotely exploitable over the network without requiring user interaction beyond authentication. The CVSS v3.1 base score of 8.8 indicates a high severity, with attack vector being network-based, low attack complexity, privileges required at a low level, no user interaction needed, and high impact on confidentiality, integrity, and availability. No patches or fixes are currently linked, and no known exploits have been observed in the wild as of the publication date. The vulnerability's root cause is inadequate authorization checks when processing user-controlled keys or parameters that dictate which user account is being updated.

Potential Impact

The impact of CVE-2025-15096 is substantial for organizations running WordPress sites with the Videospirecore Theme Plugin installed. Successful exploitation allows attackers with minimal privileges to escalate their access to administrator-level accounts, resulting in full site compromise. This can lead to unauthorized data access, modification, or deletion, insertion of malicious content or backdoors, and disruption of website availability. The attacker could also leverage the compromised administrator account to pivot further into the organization's network or use the site as a platform for phishing or malware distribution. Given WordPress's widespread use for business, e-commerce, and content management, the vulnerability poses a significant risk to confidentiality, integrity, and availability of web assets. Organizations that fail to address this vulnerability may face reputational damage, financial loss, and regulatory penalties if sensitive user data is exposed or manipulated.

Mitigation Recommendations

To mitigate CVE-2025-15096, organizations should immediately upgrade the Videospirecore Theme Plugin to a patched version once available. In the absence of an official patch, administrators should consider disabling or removing the plugin to eliminate the attack surface. Implement strict access controls to limit Subscriber-level accounts and monitor for unusual account changes or password reset requests. Employ multi-factor authentication (MFA) for administrator accounts to reduce the risk of account takeover even if email addresses are changed. Regularly audit user accounts and email addresses for unauthorized modifications. Additionally, web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting user update functions. Monitoring logs for anomalous activity related to user management endpoints is also recommended. Finally, maintain regular backups of website data and configurations to enable rapid recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-25T15:05:00.627Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c536b4b57a58fa18a16a8

Added to database: 2/11/2026, 10:01:15 AM

Last enriched: 2/27/2026, 11:52:50 AM

Last updated: 3/29/2026, 1:40:08 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses