The Bravis User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.0. This is due to the plugin not properly logging a user in with the data that was previously verified through the facebook_ajax_login_callback(). This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site, and access to the administrative user's email.
Metrics
Affected Vendors & Products
References
History
Mon, 25 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sun, 24 Aug 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wordpress
Wordpress wordpress |
|
Vendors & Products |
Wordpress
Wordpress wordpress |
Sat, 23 Aug 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Bravis User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.0. This is due to the plugin not properly logging a user in with the data that was previously verified through the facebook_ajax_login_callback(). This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site, and access to the administrative user's email. | |
Title | Bravis User <= 1.0.0 - Authentication Bypass to Account Takeover | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-23T06:43:36.291Z
Updated: 2025-08-25T18:16:08.627Z
Reserved: 2025-05-21T15:10:04.708Z
Link: CVE-2025-5060

Updated: 2025-08-25T18:16:04.986Z

Status : Awaiting Analysis
Published: 2025-08-23T07:15:31.953
Modified: 2025-08-25T20:24:45.327
Link: CVE-2025-5060

No data.