Cyber Posture

CVE-2025-6388

Critical

Published: 03 October 2025

Published
03 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0039 60.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-6388 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Themespirit (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and IA-2 (Identification and Authentication (Organizational Users)).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediating the known authentication bypass flaw in the Spirit Framework plugin by applying vendor patches directly prevents exploitation allowing unauthenticated login as any user.

prevent

Requiring robust identification and authentication for organizational users prevents bypasses due to inadequate identity validation in plugin functions like custom_actions().

prevent

Enforcing approved access authorizations ensures proper identity validation before authentication, mitigating the plugin's failure to do so.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an authentication bypass in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application for unauthorized admin access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site. This…

more

makes it possible for unauthenticated attackers to log in as any user, including administrators, granted they have access to the administrator's username.

Deeper analysisAI

CVE-2025-6388 is an authentication bypass vulnerability affecting the Spirit Framework plugin for WordPress in all versions up to and including 1.2.14. The issue stems from the custom_actions() function failing to properly validate a user's identity before authenticating them to the site, as identified under CWE-288. It has been assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of prerequisites.

Unauthenticated attackers can exploit this vulnerability remotely if they know an administrator's username, allowing them to log in as any user, including administrators. Successful exploitation grants full access to the WordPress site, enabling attackers to perform privileged actions such as modifying content, installing malicious plugins, or exfiltrating data.

Advisories from Wordfence and the plugin developer's changelog at themespirit.com/talemy-changelog/ detail the vulnerability, with mitigation likely involving updating to a patched version beyond 1.2.14. Security practitioners should immediately review and update affected Spirit Framework installations.

Details

CWE(s)

Affected Products

Themespirit
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-25471Shared CWE-288
CVE-2026-40630Shared CWE-288
CVE-2025-67039Shared CWE-288
CVE-2025-13539Shared CWE-288
CVE-2026-31151Shared CWE-288
CVE-2025-64236Shared CWE-288
CVE-2025-27129Shared CWE-288
CVE-2025-5955Shared CWE-288
CVE-2025-63217Shared CWE-288
CVE-2025-67070Shared CWE-288

References