Cyber Posture

CVE-2025-10850

Critical

Published: 16 October 2025

Published
16 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0028 51.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.

Security Summary

CVE-2025-10850 is an improper authentication vulnerability in the Felan Framework plugin for WordPress, affecting versions up to and including 1.1.4. The issue arises from hardcoded passwords within the 'fb_ajax_login_or_register' and 'google_ajax_login_or_register' functions, mapped to CWE-798 (Use of Hard-coded Credentials). Published on 2025-10-16, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), denoting critical severity due to its potential for high-impact remote exploitation.

Unauthenticated attackers can exploit this vulnerability to log in as any existing user on the affected site who registered via Facebook or Google social login and did not change their password afterward. Exploitation requires no privileges, user interaction, or special conditions beyond knowing or guessing the hardcoded credentials, enabling attackers to impersonate victims and access their account privileges, which could lead to full site takeover if targeting administrators.

Advisories provide further details via references including the plugin's ThemeForest product page at https://themeforest.net/item/felan-freelance-marketplace-and-job-board-wordpress-theme/53612955 and Wordfence's threat intelligence entry at https://www.wordfence.com/threat-intel/vulnerabilities/id/ab4c7656-544c-4f2f-a42f-264ac90e3b61?source=cve. CVE-2025-23504 is identified as a likely duplicate of this issue.

Details

CWE(s)
CWE-798

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
Why these techniques?

Vulnerability in public-facing WordPress plugin enables unauthenticated remote exploitation (T1190) via hardcoded passwords, allowing login as users with unchanged default credentials from social logins (T1078.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References