Cyber Posture

CVE-2025-5060

High

Published: 23 August 2025

Published
23 August 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0020 41.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-5060 is a high-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Themeforest (inferred from references). Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-2 (Identification and Authentication (Organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of flaws like the authentication bypass in the Bravis User plugin to prevent exploitation.

prevent

Mandates unique identification and authentication of users to mitigate bypass vulnerabilities in WordPress plugins such as improper handling of facebook_ajax_login_callback().

prevent

Enforces approved authorizations for logical access, preventing unauthenticated attackers from logging in as admins via the flawed alternate authentication path.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authentication bypass in public-facing WordPress plugin directly enables remote exploitation for unauthorized admin access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

The Bravis User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.1. This is due to the plugin not properly logging a user in with the data that was previously verified through the…

more

facebook_ajax_login_callback(). This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site, and access to the administrative user's email.

Deeper analysisAI

CVE-2025-5060 is an authentication bypass vulnerability in the Bravis User plugin for WordPress, affecting all versions up to and including 1.0.1. The flaw occurs because the plugin does not properly log in users with data previously verified through the facebook_ajax_login_callback() function, enabling unauthorized access. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H) and maps to CWE-288 (Authentication Bypass Using an Alternate Path or Channel). The vulnerability was published on 2025-08-23T07:15:31.953.

Unauthenticated attackers can exploit this issue over the network to log in as administrative users, provided they have an existing account on the target site and access to the administrative user's email. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing attackers to take full control of the site as an administrator.

Advisories providing further details, including potential mitigation steps, are available from Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/c6c52f1a-2203-4abe-b777-064bd6fd1714?source=cve and the plugin's ThemeForest listing at https://themeforest.net/item/graviton-construction-wordpress-theme/50429299.

Details

CWE(s)

Affected Products

Themeforest
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-25471Shared CWE-288
CVE-2026-40630Shared CWE-288
CVE-2025-67039Shared CWE-288
CVE-2025-13539Shared CWE-288
CVE-2026-31151Shared CWE-288
CVE-2025-64236Shared CWE-288
CVE-2025-27129Shared CWE-288
CVE-2025-5955Shared CWE-288
CVE-2025-63217Shared CWE-288
CVE-2025-67070Shared CWE-288

References