CVE-2025-1564
Published: 01 March 2025
Summary
CVE-2025-1564 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-2 (Identification and Authentication (Organizational Users)) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely identification, reporting, and correction of the authentication bypass flaw in the SetSail Membership plugin prevents unauthenticated attackers from logging in as any user including administrators.
Requires systems to uniquely identify and authenticate users before granting access, directly addressing the plugin's failure to properly verify identity through social login.
Monitors the system for unauthorized connections and access attempts, enabling detection of account takeovers resulting from the authentication bypass.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Auth bypass in public-facing WordPress plugin directly enables remote exploitation (T1190) and unauthorized use of valid accounts including admin takeover (T1078).
NVD Description
The SetSail Membership plugin for WordPress is vulnerable to in all versions up to, and including, 1.0.3. This is due to the plugin not properly verifying a users identity through the social login. This makes it possible for unauthenticated attackers…
more
to log in as any user, including administrators and take over access to their account.
Deeper analysisAI
CVE-2025-1564 is an authentication bypass vulnerability in the SetSail Membership plugin for WordPress, affecting all versions up to and including 1.0.3. The flaw arises because the plugin does not properly verify a user's identity through social login, allowing unauthorized access. It has a CVSS v3.1 base score of 9.8 (Critical), with a vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and is associated with CWE-288. The vulnerability was published on 2025-03-01T08:15:34.007.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables attackers to log in as any user on the site, including administrators, effectively taking over their accounts and gaining full control over the WordPress installation.
Mitigation details are available in related advisories, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/c2c2385e-0d1e-435a-9b82-972964084148?source=cve and the SetSail theme page on ThemeForest at https://themeforest.net/item/setsail-travel-agency-theme/22832625.
Details
- CWE(s)