Cyber Posture

CVE-2025-69401

High

Published: 20 February 2026

Published
20 February 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0007 21.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-69401 is a high-severity Authentication Bypass by Spoofing (CWE-290) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-290

Reveals spoofed logon attempts through unexpected previous logon timestamps upon legitimate login.

addresses: CWE-290

Training specifically addresses recognizing spoofed communications and phishing that enable authentication bypass.

addresses: CWE-290

Requiring verifiable identity evidence at appropriate assurance levels makes it substantially harder for attackers to successfully spoof or impersonate users to obtain accounts.

addresses: CWE-290

Unique device authentication makes successful spoofing of device identity substantially more difficult to achieve.

addresses: CWE-290

Unique identification of non-organizational users reduces the feasibility of authentication bypass by spoofing.

addresses: CWE-290

Unique identification and authentication of services before communications makes spoofing of service identities substantially harder.

addresses: CWE-290

Isolated trusted path ensures the user interacts only with genuine system components, preventing spoofing of authentication interfaces or prompts.

addresses: CWE-290

Directly counters DNS response spoofing by requiring cryptographic origin authentication artifacts from the authoritative source.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Auth bypass by spoofing in public-facing WordPress plugin directly enables exploitation of the web application without credentials.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Authentication Bypass by Spoofing vulnerability in mdalabar WooODT Lite byconsole-woo-order-delivery-time allows Identity Spoofing.This issue affects WooODT Lite: from n/a through <= 2.5.2.

Deeper analysisAI

CVE-2025-69401 is an Authentication Bypass by Spoofing vulnerability (CWE-290) in the WooODT Lite WordPress plugin from mdalabar and byconsole-woo-order-delivery-time. This issue affects all versions of the plugin from n/a through 2.5.2. The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), highlighting its potential for high integrity impact without affecting confidentiality or availability.

An unauthenticated attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation enables identity spoofing, allowing the attacker to bypass authentication mechanisms in the affected plugin.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/byconsole-woo-order-delivery-time/vulnerability/wordpress-wooodt-lite-plugin-2-5-2-payment-bypass-vulnerability-vulnerability?_s_id=cve provides further details on the vulnerability, including information on patches and mitigation recommendations. Security practitioners should consult this reference for specific remediation steps, such as updating to a patched version beyond 2.5.2.

Details

CWE(s)

CVEs Like This One

CVE-2026-33661Shared CWE-290
CVE-2026-34457Shared CWE-290
CVE-2026-35622Shared CWE-290
CVE-2026-3902Shared CWE-290
CVE-2026-30975Shared CWE-290
CVE-2026-21862Shared CWE-290
CVE-2026-0834Shared CWE-290
CVE-2025-11250Shared CWE-290
CVE-2025-59385Shared CWE-290
CVE-2026-32045Shared CWE-290

References