Skip to main content

CVE-2025-5190: CWE-288 Authentication Bypass Using an Alternate Path or Channel in sorich87 Browse As

High
VulnerabilityCVE-2025-5190cvecve-2025-5190cwe-288
Published: Fri May 30 2025 (05/30/2025, 11:15:10 UTC)
Source: CVE Database V5
Vendor/Project: sorich87
Product: Browse As

Description

The Browse As plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.2. This is due to incorrect authentication checking in the 'IS_BA_Browse_As::notice' function with the 'is_ba_original_user_COOKIEHASH' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the user id.

AI-Powered Analysis

AILast updated: 07/07/2025, 21:57:57 UTC

Technical Analysis

CVE-2025-5190 is a high-severity authentication bypass vulnerability affecting the Browse As plugin for WordPress, developed by sorich87. This vulnerability exists in all versions up to and including 0.2 of the plugin. The root cause is improper authentication validation within the 'IS_BA_Browse_As::notice' function, specifically related to the handling of the 'is_ba_original_user_COOKIEHASH' cookie value. An attacker with at least subscriber-level permissions on a WordPress site can exploit this flaw to impersonate any existing user, including administrators, by leveraging knowledge of the target user's ID. This bypass does not require user interaction and can be executed remotely over the network. The vulnerability is classified under CWE-288, which involves authentication bypass through alternate paths or channels. The CVSS v3.1 base score is 8.8, reflecting its critical impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. Although no public exploits have been reported yet, the vulnerability's nature makes it a significant risk for WordPress sites using this plugin, as it allows privilege escalation and full control over the site by unauthorized users.

Potential Impact

For European organizations, this vulnerability poses a serious threat, especially for those relying on WordPress sites with the Browse As plugin installed. Successful exploitation can lead to full administrative access, enabling attackers to modify website content, steal sensitive data, inject malicious code, or disrupt services. This can result in data breaches violating GDPR regulations, reputational damage, and operational downtime. Organizations in sectors such as finance, healthcare, government, and e-commerce are particularly at risk due to the sensitive nature of their data and the criticality of their online presence. The ease of exploitation by low-privilege users increases the likelihood of insider threats or compromised accounts being leveraged for attacks. Additionally, the lack of public patches or mitigations at the time of disclosure heightens the urgency for organizations to implement protective measures promptly.

Mitigation Recommendations

1. Immediate mitigation involves disabling or uninstalling the Browse As plugin until a security patch is released by the vendor. 2. Restrict subscriber-level user permissions and audit existing user roles to minimize the number of accounts that could exploit this vulnerability. 3. Implement strict monitoring and logging of user activities, focusing on privilege escalations and unusual login patterns. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function or cookie manipulation attempts. 5. Enforce multi-factor authentication (MFA) for all users, especially administrators, to reduce the risk of account compromise. 6. Regularly update WordPress core and plugins, and subscribe to security advisories from trusted sources to apply patches promptly once available. 7. Conduct security awareness training for site administrators and users about the risks of privilege escalation and the importance of secure credential handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-26T05:12:25.477Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839a468182aa0cae2aec754

Added to database: 5/30/2025, 12:28:24 PM

Last enriched: 7/7/2025, 9:57:57 PM

Last updated: 8/12/2025, 9:05:35 AM

Views: 56

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats