Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1671: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Elated-Themes Academist Membership

0
Critical
VulnerabilityCVE-2025-1671cvecve-2025-1671cwe-288
Published: Sat Mar 01 2025 (03/01/2025, 07:24:04 UTC)
Source: CVE Database V5
Vendor/Project: Elated-Themes
Product: Academist Membership

Description

CVE-2025-1671 is a critical authentication bypass vulnerability in the Academist Membership WordPress plugin by Elated-Themes, affecting all versions up to 1. 1. 6. The flaw arises from improper identity verification in the academist_membership_check_facebook_user() function, allowing unauthenticated attackers to log in as any user, including administrators. This vulnerability enables full privilege escalation without requiring user interaction or prior authentication. Exploitation can lead to complete compromise of affected WordPress sites, including data theft, site defacement, or further malware deployment. No public exploits are currently known, but the high CVSS score of 9. 8 reflects the severe risk. Organizations using this plugin should urgently apply patches once available or implement immediate mitigations. The threat primarily impacts WordPress sites globally, with higher risk in countries where WordPress and this plugin have significant usage.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:06:57 UTC

Technical Analysis

The Academist Membership plugin for WordPress, developed by Elated-Themes, suffers from a critical authentication bypass vulnerability identified as CVE-2025-1671. This vulnerability stems from the academist_membership_check_facebook_user() function, which fails to properly verify the identity of users before authenticating them. Specifically, the function does not adequately validate the authenticity of Facebook user credentials or session data, allowing an attacker to bypass normal authentication controls. As a result, an unauthenticated attacker can impersonate any user on the WordPress site, including administrators, thereby gaining full control over the site. The vulnerability affects all versions up to and including 1.1.6, with no exceptions noted. The CVSS 3.1 base score is 9.8, indicating a critical severity with network attack vector, no required privileges, no user interaction, and full impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability’s nature and ease of exploitation make it a significant threat. The lack of a patch at the time of reporting necessitates immediate risk mitigation. This vulnerability falls under CWE-288, which covers authentication bypass using alternate paths or channels, highlighting a fundamental flaw in the authentication logic of the plugin. Given WordPress’s widespread use and the plugin’s role in membership management, this flaw could be leveraged to compromise numerous websites, leading to data breaches, unauthorized content changes, or deployment of malicious code.

Potential Impact

The impact of CVE-2025-1671 is severe and far-reaching. Successful exploitation grants attackers full administrative access to affected WordPress sites without any authentication, enabling them to steal sensitive data, modify or delete content, install backdoors or malware, and disrupt site availability. This can lead to reputational damage, loss of customer trust, regulatory penalties, and financial losses for organizations relying on these websites. Membership sites often store personal user information and payment data, increasing the risk of identity theft and fraud. The vulnerability’s network-based exploitability and lack of user interaction requirements mean attackers can automate attacks at scale, potentially compromising many sites rapidly. Additionally, compromised administrator accounts can be used as pivot points for further attacks within organizational networks. The absence of known exploits currently provides a narrow window for remediation before active exploitation begins. Organizations worldwide using this plugin are at risk, especially those with high-value data or critical online services.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Immediately disable or deactivate the Academist Membership plugin to prevent exploitation. 2) Restrict access to the WordPress admin interface by IP whitelisting or VPN to limit exposure. 3) Implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the academist_membership_check_facebook_user() function or related endpoints. 4) Monitor logs for unusual login attempts or access patterns indicative of exploitation attempts. 5) Enforce strong, unique passwords and enable multi-factor authentication (MFA) for all administrator accounts to reduce risk from compromised credentials. 6) Regularly back up website data and verify backup integrity to enable recovery from potential compromises. 7) Once a patch is available, apply it immediately and verify the plugin version is updated. 8) Consider alternative membership management plugins with a strong security track record if immediate patching is not feasible. 9) Educate site administrators about the vulnerability and signs of compromise. These steps go beyond generic advice by focusing on immediate risk reduction and detection tailored to this specific vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-02-24T21:51:36.610Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b17b7ef31ef0b54e02a

Added to database: 2/25/2026, 9:35:19 PM

Last enriched: 2/25/2026, 10:06:57 PM

Last updated: 2/26/2026, 9:01:30 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats