Cyber Posture

CVE-2025-0749

High

Published: 07 March 2025

Published
07 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-0749 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Zendesk (inferred from references). Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the missing not-empty check on the 'verification_id' value, preventing authentication bypass via invalid input.

prevent

Enforces approved access authorizations, mitigating the logic flaw that allows unauthenticated login to verified user accounts.

prevent

Requires timely identification, reporting, and correction of the specific code flaw in the Homey theme enabling the bypass.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes an authentication bypass in a public-facing WordPress theme allowing unauthenticated network access to user accounts, directly mapping to exploitation of public-facing applications for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The Homey theme for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.3. This is due to the 'verification_id' value being set to empty, and the not empty check is missing in the dashboard user profile…

more

page. This makes it possible for unauthenticated attackers to log in to the first verified user.

Deeper analysisAI

CVE-2025-0749 is an authentication bypass vulnerability affecting the Homey theme for WordPress in versions up to and including 2.4.3. The issue stems from the 'verification_id' value being set to empty without a corresponding not empty check in the dashboard user profile page, allowing unauthorized access. It has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-288 (Authentication Bypass Using an Alternate Path or Channel).

Unauthenticated attackers can exploit this vulnerability over the network, though it requires high attack complexity. Successful exploitation enables attackers to log in as the first verified user on the site, potentially granting them full access to that user's privileges, including high confidentiality, integrity, and availability impacts.

Mitigation details are available in the vendor's changelog at https://favethemes.zendesk.com/hc/en-us/articles/4407721124884-Changelog and Wordfence advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/05f87510-28c3-4ad1-b2be-2408a199cf68?source=cve, which cover patches for affected versions.

Details

CWE(s)

Affected Products

Zendesk
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-25471Shared CWE-288
CVE-2026-40630Shared CWE-288
CVE-2025-67039Shared CWE-288
CVE-2025-13539Shared CWE-288
CVE-2026-31151Shared CWE-288
CVE-2025-64236Shared CWE-288
CVE-2025-27129Shared CWE-288
CVE-2025-5955Shared CWE-288
CVE-2025-63217Shared CWE-288
CVE-2025-67070Shared CWE-288

References