CVE-2025-10294
Published: 15 October 2025
Summary
CVE-2025-10294 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Wordpress (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Establishes and enforces secure configuration settings for the OwnID plugin, ensuring the ownid_shared_secret is properly configured and not empty to prevent authentication bypass.
Manages authenticators like the ownid_shared_secret used in JWT validation, requiring verification and sufficient strength to block bypass when the value is empty or invalid.
Identifies, reports, and corrects the specific authentication bypass flaw (CWE-288) in OwnID plugin versions up to 1.3.4 via timely patching.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an authentication bypass in a public-facing WordPress plugin, allowing unauthenticated remote attackers to log in as any user including administrators, directly enabling exploitation of a public-facing application.
NVD Description
The OwnID Passwordless Login plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.3.4. This is due to the plugin not properly checking if the ownid_shared_secret value is empty prior to authenticating a user…
more
via JWT. This makes it possible for unauthenticated attackers to log in as other users, including administrators, on instances where the plugin has not been fully configured yet.
Deeper analysisAI
CVE-2025-10294 is an authentication bypass vulnerability in the OwnID Passwordless Login plugin for WordPress, affecting all versions up to and including 1.3.4. The issue arises because the plugin fails to properly verify if the ownid_shared_secret value is empty before authenticating users via JWT, published on 2025-10-15 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and mapped to CWE-288.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. On WordPress instances where the plugin has not been fully configured, attackers can log in as any other user, including administrators, potentially gaining full control over the site.
Advisories and mitigation details are available in references from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/b8dd6008-e9b8-4a87-b1c7-0dc272850cbd?source=cve and the plugin page at https://wordpress.org/plugins/ownid-passwordless-login/.
Details
- CWE(s)