CVE-2025-1671
WordPress vulnerability analysis and mitigation

Overview

The Academist Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.6. This vulnerability was discovered and disclosed on March 1, 2025 (NVD).

Technical details

The vulnerability exists in the academistmembershipcheckfacebookuser() function which fails to properly verify user identity during authentication. This implementation flaw allows unauthenticated attackers to bypass authentication controls and log in as any user, including site administrators. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified as an Authentication Bypass Using an Alternate Path or Channel (CWE-288) (NVD, Wordfence).

Impact

The vulnerability allows unauthenticated attackers to gain unauthorized access to any user account on the affected WordPress site, including administrator accounts. This could lead to complete site compromise, as attackers can gain full administrative control of the WordPress installation (NVD).

Mitigation and workarounds

The vulnerability was fixed in version 1.2 of the Academist Membership plugin, released on February 26, 2025. Site administrators are strongly advised to update to this version or later. If immediate updating is not possible, it is recommended to disable the plugin until it can be updated (Themeforest).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management