CVE-2025-0749
Published: 07 March 2025
Summary
CVE-2025-0749 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Zendesk (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the missing not-empty check on the 'verification_id' value, preventing authentication bypass via invalid input.
Enforces approved access authorizations, mitigating the logic flaw that allows unauthenticated login to verified user accounts.
Requires timely identification, reporting, and correction of the specific code flaw in the Homey theme enabling the bypass.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes an authentication bypass in a public-facing WordPress theme allowing unauthenticated network access to user accounts, directly mapping to exploitation of public-facing applications for initial access.
NVD Description
The Homey theme for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.3. This is due to the 'verification_id' value being set to empty, and the not empty check is missing in the dashboard user profile…
more
page. This makes it possible for unauthenticated attackers to log in to the first verified user.
Deeper analysisAI
CVE-2025-0749 is an authentication bypass vulnerability affecting the Homey theme for WordPress in versions up to and including 2.4.3. The issue stems from the 'verification_id' value being set to empty without a corresponding not empty check in the dashboard user profile page, allowing unauthorized access. It has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-288 (Authentication Bypass Using an Alternate Path or Channel).
Unauthenticated attackers can exploit this vulnerability over the network, though it requires high attack complexity. Successful exploitation enables attackers to log in as the first verified user on the site, potentially granting them full access to that user's privileges, including high confidentiality, integrity, and availability impacts.
Mitigation details are available in the vendor's changelog at https://favethemes.zendesk.com/hc/en-us/articles/4407721124884-Changelog and Wordfence advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/05f87510-28c3-4ad1-b2be-2408a199cf68?source=cve, which cover patches for affected versions.
Details
- CWE(s)