
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-6388 is a critical authentication bypass vulnerability affecting the Spirit Framework plugin for WordPress in versions up to and including 1.2.14. The vulnerability was discovered and disclosed on March 10, 2025. This security flaw exists in the custom_actions() function, which fails to properly validate user identities before authentication (NVD, Security Online).
The vulnerability has been assigned a Critical severity rating with a CVSS v3.1 score of 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The flaw is categorized under CWE-288 (Authentication Bypass Using an Alternate Path or Channel). The issue stems from improper identity validation within the custom_actions() function, which allows attackers to bypass authentication controls (NVD).
The vulnerability allows unauthenticated attackers to log in as any user, including administrators, provided they have knowledge of the target username. Once authenticated, attackers can take full control of the affected website, potentially leading to site defacement, data theft, or malware deployment (Security Online).
The developers have released Spirit Framework version 1.2.15 which includes a patch to properly validate user identities before granting authentication. Website administrators are strongly advised to update their installations immediately to mitigate the risk of exploitation (Theme Spirit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."