CVE-2025-13390
Published: 03 December 2025
Description
The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function. This is due to the feature using a…
more
cryptographically weak token generation mechanism. This makes it possible for unauthenticated attackers to gain administrative access and achieve full site takeover via the auto-login endpoint with a predictable token.
Mitigating Controls (NIST 800-53 r5)AI
IA-5 requires management of authenticators with cryptographic strength requirements, directly mitigating the use of predictably weak tokens in the auto-login function.
AC-14 restricts privileged actions without identification or authentication, preventing exploitation of the auto-login endpoint for administrative access.
SI-2 mandates timely flaw remediation, such as patching the WP Directory Kit plugin to fix the weak token generation vulnerability.
Security SummaryAI
CVE-2025-13390 is an authentication bypass vulnerability affecting the WP Directory Kit plugin for WordPress in all versions up to and including 1.4.4. The issue stems from an incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function, which relies on a cryptographically weak token generation mechanism. This flaw results in predictable tokens that can be leveraged via the auto-login endpoint, earning a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) and mapping to CWE-303 (Incorrect Implementation of Authentication Algorithm).
Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By predicting the weak token, they can access the auto-login endpoint to bypass authentication entirely, gaining administrative privileges and achieving full site takeover, including arbitrary code execution, data exfiltration, or site defacement.
Advisories from sources like Wordfence and the WordPress plugin trac recommend updating the WP Directory Kit plugin beyond version 1.4.4, with a specific patch referenced in trac changeset 3400599. Additional details on the vulnerability and proof-of-concept are available in researcher repositories such as GitHub/d0n601/CVE-2025-13390 and ryankozak.com/posts/cve-2025-13390.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables unauthenticated attackers to bypass authentication via a predictable token in a public-facing WordPress plugin, impersonating administrative accounts (T1078) and exploiting the public-facing application (T1190) for site takeover.