CVE-2025-6388
BaseFortify
Publication date: 2025-10-03
Last updated on: 2025-10-06
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| theme_spirit | spirit_framework | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-288 | The product requires authentication, but the product has an alternate path or channel that does not require authentication. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Spirit Framework plugin for WordPress has an authentication bypass vulnerability in all versions up to and including 1.2.14. This occurs because the custom_actions() function does not properly verify a user's identity before authenticating them. As a result, an unauthenticated attacker who knows an administrator's username can log in as that administrator or any other user.
How can this vulnerability impact me? :
This vulnerability can allow an attacker to gain unauthorized access to a WordPress site by logging in as any user, including administrators. This can lead to full site compromise, data theft, data modification, and disruption of services.