CVE-2025-13539
Published: 27 November 2025
Description
The FindAll Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.4. This is due to the plugin not properly logging in a user with the data that was previously verified through the…
more
'findall_membership_check_facebook_user' and the 'findall_membership_check_google_user' functions. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.
Mitigating Controls (NIST 800-53 r5)AI
Flaw remediation directly prevents exploitation by requiring updates or removal of the vulnerable FindAll Membership plugin up to version 1.0.4.
Requires proper identification and authentication of organizational users, including admins, countering the plugin's failure to complete login after verification via Facebook/Google functions.
Account management restricts easy creation of temporary user accounts via the plugin, which attackers use as a foothold for administrative impersonation.
Security SummaryAI
CVE-2025-13539 is an authentication bypass vulnerability (CWE-288) in the FindAll Membership plugin for WordPress, affecting all versions up to and including 1.0.4. The flaw occurs because the plugin does not properly log in a user after their data has been verified through the 'findall_membership_check_facebook_user' and 'findall_membership_check_google_user' functions. Published on 2025-11-27, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for complete system compromise.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no user interaction required. Exploitation requires an existing account on the target site, which can be readily created via the plugin's default temporary user functionality, along with access to an administrative user's email. Successful attacks allow attackers to log in as administrative users, granting full access to sensitive data and site controls with high impacts on confidentiality, integrity, and availability.
Advisories provide further details on the vulnerability, including a Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/a856a96a-68d2-462d-b523-840668980807?source=cve. The plugin is a component of the FindAll Business Directory Theme, available on ThemeForest at https://themeforest.net/item/findall-business-directory-theme/24415962.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an authentication bypass in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application to gain administrative access.