Cyber Posture

CVE-2025-0749

High

Published: 07 March 2025

Published
07 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-0749 is an authentication bypass vulnerability affecting the Homey theme for WordPress in versions up to and including 2.4.3. The issue stems from the 'verification_id' value being set to empty without a corresponding not empty check in the dashboard user profile page, allowing unauthorized access. It has a CVSS v3.1 base score of 8.1 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-288 (Authentication Bypass Using an Alternate Path or Channel).

Unauthenticated attackers can exploit this vulnerability over the network, though it requires high attack complexity. Successful exploitation enables attackers to log in as the first verified user on the site, potentially granting them full access to that user's privileges, including high confidentiality, integrity, and availability impacts.

Mitigation details are available in the vendor's changelog at https://favethemes.zendesk.com/hc/en-us/articles/4407721124884-Changelog and Wordfence advisory at https://www.wordfence.com/threat-intel/vulnerabilities/id/05f87510-28c3-4ad1-b2be-2408a199cf68?source=cve, which cover patches for affected versions.

Details

CWE(s)
CWE-288

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes an authentication bypass in a public-facing WordPress theme allowing unauthenticated network access to user accounts, directly mapping to exploitation of public-facing applications for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References