The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site. This makes it possible for unauthenticated attackers to log in as any user, including administrators, granted they have access to the administrator's username.
Metrics
Affected Vendors & Products
References
History
Mon, 06 Oct 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wordpress
Wordpress wordpress |
|
Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 03 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Oct 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site. This makes it possible for unauthenticated attackers to log in as any user, including administrators, granted they have access to the administrator's username. | |
Title | Spirit Framework <= 1.2.14 - Authentication Bypass to Account Takeover and Privilege Escalation | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-10-03T08:23:49.620Z
Updated: 2025-10-03T15:56:24.432Z
Reserved: 2025-06-20T00:46:48.403Z
Link: CVE-2025-6388

Updated: 2025-10-03T15:56:16.977Z

Status : Awaiting Analysis
Published: 2025-10-03T09:15:38.300
Modified: 2025-10-06T14:57:05.000
Link: CVE-2025-6388

No data.