Cyber Posture

CVE-2025-6388

Critical

Published: 03 October 2025

Published
03 October 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0053 67.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-6388 is an authentication bypass vulnerability affecting the Spirit Framework plugin for WordPress in all versions up to and including 1.2.14. The issue stems from the custom_actions() function, which fails to properly validate a user's identity before authenticating them to the site. This flaw, classified under CWE-288, has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high confidentiality, integrity, and availability impacts.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required. By knowing an administrator's username, attackers can log in as any user, including administrators, gaining full control over the affected WordPress site. This enables actions such as data exfiltration, modification of site content, or further compromise of the environment.

Advisories from Wordfence and the plugin developer's changelog at themespirit.com/talemy-changelog/ provide details on mitigation, including recommendations to update to a patched version beyond 1.2.14 where available. Security practitioners should immediately review installations of the Spirit Framework plugin and apply updates or remove it if no patch exists.

Details

CWE(s)
CWE-288

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability is an authentication bypass in a public-facing WordPress plugin, directly enabling exploitation of a public-facing application for unauthorized admin access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References