
Cloud Vulnerability DB
A community-led vulnerabilities database
The Auth0 WordPress plugin vulnerability (CVE-2025-47275) affects applications using versions prior to 5.3.0, discovered by Félix Charette and disclosed on May 15, 2025. The vulnerability specifically impacts applications using the Auth0 WordPress Plugin with version <=5.2.1 and Auth0-PHP SDK versions between 8.0.0-BETA1 and 8.14.0 that have session storage configured with CookieStore (GitHub Advisory).
The vulnerability involves session cookies of applications using the Auth0 WordPress plugin configured with CookieStore having authentication tags that can be brute forced. The vulnerability has received a Critical CVSS v3.1 base score of 9.1, with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N. This indicates network-based attack vector, low attack complexity, no privileges required, no user interaction needed, unchanged scope, and high impact on both confidentiality and integrity (GitHub Advisory).
The vulnerability can result in unauthorized access to affected systems. The CVSS scoring indicates high impact on both confidentiality and integrity of the affected systems, though availability is not impacted. The critical severity rating suggests potential significant consequences for affected installations (GitHub Advisory).
The vulnerability has been patched in version 5.3.0 of the Auth0 WordPress plugin. Users are advised to upgrade to this version immediately. Additionally, it is recommended to rotate cookie encryption keys as a precautionary measure. It should be noted that after updating, any previous session cookies will be rejected (GitHub Advisory, WordPress Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."