Description
The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site. This makes it possible for unauthenticated attackers to log in as any user, including administrators, granted they have access to the administrator's username.
Problem types
CWE-288 Authentication Bypass Using an Alternate Path or Channel
Product status
*
Timeline
2025-06-25: | Vendor Notified |
2025-10-02: | Disclosed |
Credits
Tonn
References
www.wordfence.com/...-4328-451f-a595-1ce17e9d0031?source=cve
themespirit.com/talemy-changelog/