CVE-2025-5060
Published: 23 August 2025
Summary
CVE-2025-5060 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Themeforest (inferred from references). Its CVSS base score is 8.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-2 (Identification and Authentication (Organizational Users)).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely identification, reporting, and correction of flaws like the authentication bypass in the Bravis User plugin to prevent exploitation.
Mandates unique identification and authentication of users to mitigate bypass vulnerabilities in WordPress plugins such as improper handling of facebook_ajax_login_callback().
Enforces approved authorizations for logical access, preventing unauthenticated attackers from logging in as admins via the flawed alternate authentication path.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authentication bypass in public-facing WordPress plugin directly enables remote exploitation for unauthorized admin access.
NVD Description
The Bravis User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.1. This is due to the plugin not properly logging a user in with the data that was previously verified through the…
more
facebook_ajax_login_callback(). This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site, and access to the administrative user's email.
Deeper analysisAI
CVE-2025-5060 is an authentication bypass vulnerability in the Bravis User plugin for WordPress, affecting all versions up to and including 1.0.1. The flaw occurs because the plugin does not properly log in users with data previously verified through the facebook_ajax_login_callback() function, enabling unauthorized access. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H) and maps to CWE-288 (Authentication Bypass Using an Alternate Path or Channel). The vulnerability was published on 2025-08-23T07:15:31.953.
Unauthenticated attackers can exploit this issue over the network to log in as administrative users, provided they have an existing account on the target site and access to the administrative user's email. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to take full control of the site as an administrator.
Advisories providing further details, including potential mitigation steps, are available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/c6c52f1a-2203-4abe-b777-064bd6fd1714?source=cve and the plugin's ThemeForest listing at https://themeforest.net/item/graviton-construction-wordpress-theme/50429299.
Details
- CWE(s)