Cyber Posture

CVE-2025-1564

Critical

Published: 01 March 2025

Published
01 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1564 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Themeforest (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-2 (Identification and Authentication (Organizational Users)) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely identification, reporting, and correction of the authentication bypass flaw in the SetSail Membership plugin prevents unauthenticated attackers from logging in as any user including administrators.

prevent

Requires systems to uniquely identify and authenticate users before granting access, directly addressing the plugin's failure to properly verify identity through social login.

detect

Monitors the system for unauthorized connections and access attempts, enabling detection of account takeovers resulting from the authentication bypass.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Auth bypass in public-facing WordPress plugin directly enables remote exploitation (T1190) and unauthorized use of valid accounts including admin takeover (T1078).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The SetSail Membership plugin for WordPress is vulnerable to in all versions up to, and including, 1.0.3. This is due to the plugin not properly verifying a users identity through the social login. This makes it possible for unauthenticated attackers…

more

to log in as any user, including administrators and take over access to their account.

Deeper analysisAI

CVE-2025-1564 is an authentication bypass vulnerability in the SetSail Membership plugin for WordPress, affecting all versions up to and including 1.0.3. The flaw arises because the plugin does not properly verify a user's identity through social login, allowing unauthorized access. It has a CVSS v3.1 base score of 9.8 (Critical), with a vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, and is associated with CWE-288. The vulnerability was published on 2025-03-01T08:15:34.007.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Successful exploitation enables attackers to log in as any user on the site, including administrators, effectively taking over their accounts and gaining full control over the WordPress installation.

Mitigation details are available in related advisories, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/c2c2385e-0d1e-435a-9b82-972964084148?source=cve and the SetSail theme page on ThemeForest at https://themeforest.net/item/setsail-travel-agency-theme/22832625.

Details

CWE(s)

Affected Products

Themeforest
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-7444Shared CWE-288
CVE-2026-27389Shared CWE-288
CVE-2025-23504Shared CWE-288
CVE-2025-8359Shared CWE-288
CVE-2025-7710Shared CWE-288
CVE-2026-29139Shared CWE-288
CVE-2026-27049Shared CWE-288
CVE-2025-26966Shared CWE-288
CVE-2025-7642Shared CWE-288
CVE-2026-25357Shared CWE-288

References