CVE-2025-13539
Published: 27 November 2025
Summary
CVE-2025-13539 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-2 (Identification and Authentication (Organizational Users)).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly prevents exploitation by requiring updates or removal of the vulnerable FindAll Membership plugin up to version 1.0.4.
Requires proper identification and authentication of organizational users, including admins, countering the plugin's failure to complete login after verification via Facebook/Google functions.
Account management restricts easy creation of temporary user accounts via the plugin, which attackers use as a foothold for administrative impersonation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an authentication bypass in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application to gain administrative access.
NVD Description
The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.4. This is due to the plugin not properly logging in a user with the data that was previously verified through the…
more
'findall_membership_check_facebook_user' and the 'findall_membership_check_google_user' functions. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.
Deeper analysisAI
CVE-2025-13539 is an authentication bypass vulnerability (CWE-288) in the FindAll Membership plugin for WordPress, affecting all versions up to and including 1.0.4. The flaw occurs because the plugin does not properly log in a user after their data has been verified through the 'findall_membership_check_facebook_user' and 'findall_membership_check_google_user' functions. Published on 2025-11-27, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for complete system compromise.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. Exploitation requires an existing account on the target site, which can be readily created via the plugin's default temporary user functionality, along with access to an administrative user's email. Successful attacks allow attackers to log in as administrative users, granting full access to sensitive data and site controls with high impacts on confidentiality, integrity, and availability.
Advisories provide further details on the vulnerability, including a Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/a856a96a-68d2-462d-b523-840668980807?source=cve. The plugin is a component of the FindAll Business Directory Theme, available on ThemeForest at https://themeforest.net/item/findall-business-directory-theme/24415962.
Details
- CWE(s)