CVE-2025-6388
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-03

Last updated on: 2025-10-06

Assigner: Wordfence

Description
The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site. This makes it possible for unauthenticated attackers to log in as any user, including administrators, granted they have access to the administrator's username.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-03
Last Modified
2025-10-06
Generated
2026-05-07
AI Q&A
2025-10-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
theme_spirit spirit_framework *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Spirit Framework plugin for WordPress has an authentication bypass vulnerability in all versions up to and including 1.2.14. This occurs because the custom_actions() function does not properly verify a user's identity before authenticating them. As a result, an unauthenticated attacker who knows an administrator's username can log in as that administrator or any other user.


How can this vulnerability impact me? :

This vulnerability can allow an attacker to gain unauthorized access to a WordPress site by logging in as any user, including administrators. This can lead to full site compromise, data theft, data modification, and disruption of services.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart