Cyber Posture

CVE-2025-13539

Critical

Published: 27 November 2025

Published
27 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0046 64.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.4. This is due to the plugin not properly logging in a user with the data that was previously verified through the…

more

'findall_membership_check_facebook_user' and the 'findall_membership_check_google_user' functions. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Flaw remediation directly prevents exploitation by requiring updates or removal of the vulnerable FindAll Membership plugin up to version 1.0.4.

prevent

Requires proper identification and authentication of organizational users, including admins, countering the plugin's failure to complete login after verification via Facebook/Google functions.

prevent

Account management restricts easy creation of temporary user accounts via the plugin, which attackers use as a foothold for administrative impersonation.

Security SummaryAI

CVE-2025-13539 is an authentication bypass vulnerability (CWE-288) in the FindAll Membership plugin for WordPress, affecting all versions up to and including 1.0.4. The flaw occurs because the plugin does not properly log in a user after their data has been verified through the 'findall_membership_check_facebook_user' and 'findall_membership_check_google_user' functions. Published on 2025-11-27, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for complete system compromise.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. Exploitation requires an existing account on the target site, which can be readily created via the plugin's default temporary user functionality, along with access to an administrative user's email. Successful attacks allow attackers to log in as administrative users, granting full access to sensitive data and site controls with high impacts on confidentiality, integrity, and availability.

Advisories provide further details on the vulnerability, including a Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/a856a96a-68d2-462d-b523-840668980807?source=cve. The plugin is a component of the FindAll Business Directory Theme, available on ThemeForest at https://themeforest.net/item/findall-business-directory-theme/24415962.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an authentication bypass in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application to gain administrative access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References