Skip to content
RedPacket Security

RedPacket Security

InfoSec News & Tutorials

Primary Menu RedPacket Security

RedPacket Security

  • Home
  • Merch
  • Premium Members Content
    • Offensive SecurityOffensive Security focuses on proactively testing and strengthening cybersecurity by simulating real-world attacks. This category covers penetration testing, ethical hacking techniques, exploit development, red teaming, and adversarial tactics used to identify and fix vulnerabilities before malicious actors exploit them. Whether you’re a cybersecurity professional, ethical hacker, or enthusiast, you’ll find expert insights, tools, methodologies, and case studies to enhance your offensive security skills. Stay ahead of threats by learning how attackers think and operate, ensuring robust defence through strategic offence
    • Threat Hunting
    • TutorialsTutorials
    • Hack The BoxGuides / Tutorials on Hack The Box https://www.hackthebox.eu/home
    • Try Hack MeGuides / Tutorials on Try Hack Me These posts are password protected. To obtain the password you will need to become a patreon:
  • News
    • US-CERT
    • HKCERT
    • OSINT
    • CISA
    • NCSC
  • Data Breach
    • Ransomware
  • Malware Analysis
    • Covenant C2
    • Cobalt Strike
    • Brute Ratel C4
    • Posh C2
    • PikaBot C2
    • SliverC2
  • Vulnerabilities
    • Bug Bounty
  • Tools
  • Home
  • Vulnerabilities
  • CVE Alert: CVE-2025-10299 – hakik – WPBifröst – Instant Passwordless Temporary Login Links
  • Vulnerabilities

CVE Alert: CVE-2025-10299 – hakik – WPBifröst – Instant Passwordless Temporary Login Links

October 16, 2025

CVE-2025-10299

HIGHNo exploitation known

The WPBifröst – Instant Passwordless Temporary Login Links plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the ctl_create_link AJAX action in all versions up to, and including, 1.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new administrative user accounts and subsequently log in as those.

CVSS v3.1 (8.8)
Vendor
hakik
Product
WPBifröst – Instant Passwordless Temporary Login Links
Versions
* lte 1.0.7
CWE
CWE-862, CWE-862 Missing Authorization
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-10-15T08:25:55.167Z
Updated
2025-10-15T14:45:52.224Z
References
https://www.wordfence.com/threat-intel/vulnerabilities/id/50946bc7-8d31-4376-bdcc-de7aad700503?source=cve
https://wordpress.org/plugins/create-temporary-login/

AI Summary Analysis

Risk verdict

High risk: authenticated subscribers (and above) can escalate to admin privileges via a missing authorization check, with no user interaction required; no active exploitation indicated yet, but patching is urgent.

Why this matters

An attacker gaining admin rights can fully compromise the site, exfiltrate or modify data, install backdoors, and threaten site availability. The capability escalation target is high-value admin control, so even low-volume exploitation could yield outsized impact across multiple WordPress deployments using this plugin.

Most likely attack path

An authenticated user with Subscriber+ privileges calls the ctl_create_link AJAX action, which lacks proper authorization checks. Given AV Network and UI N/A, the attack is remotely exploitable by any subscriber-level account, and scope remains unchanged; the attacker then creates an admin account and logs in as that user, enabling persistence and broad control.

Who is most exposed

Sites running WordPress with the WPBifröst plugin installed are at risk, especially where subscriber-based login flows are exposed to end users (common in smaller WordPress deployments and hosting environments).

Detection ideas

  • Monitor for sudden creation of new admin accounts.
  • Inspect admin-ajax.php requests for action=ctl_create_link from authenticated sessions.
  • Alert on unusual or rapid admin logins or privilege-change events.
  • Correlate with plugin version and recent updates; flag outdated 1.0.7 and earlier.

Mitigation and prioritisation

  • Patch to the fixed release (latest version) as soon as available; remove or disable the plugin if patching isn’t feasible.
  • Implement least-privilege: prohibit or restrict ctl_create_link usage; require higher privileges for account creation.
  • Enable robust logging and alerting on admin creation and plugin-related actions; conduct credential hygiene (rotate admin passwords).
  • Apply WAF controls or disable the AJAX endpoint while patching; test in staging before production roll-out.
  • If KEV or high EPSS were present, treat as priority 1; with current indicators, prioritise as high (priority 2).

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features
Buy Me A Coffee Patreon
Tags: CVE, cve-2025-10299, hakik, OSINT, threatintel, wpbifrost-instant-passwordless-temporary-login-links

Post navigation

Previous: CVE Alert: CVE-2025-11501 – markomaksym – Dynamically Display Posts

Search

SUPPORT THE WEBSITE



OFFICIAL MERCH STORE


Recommended eBook



Tags

#threatintel #security #osint 8base akira Black Basta bug bounty Bypass Security cisa CobaltStrikeBeaconDetected CONFIRM Cross-Site Scripting Cross Site Scripting CVE cybersecurity Cybersecurity dark web Dark Web data breach Data Manipulation Denial of Service exploit Gain Access Gain Privileges hacking HaveIBeenPwnedLatestBreaches HIBP hunters international Lockbit 2.0 lockbit 3.0 malware MISC Obtain Information OSINT patch play ransomware Qilin ransomware Security Sliver C2 threatintel tools tor TroyHunt US-CERT Vendor Advisory vulnerability

You may have missed

image
  • Vulnerabilities

CVE Alert: CVE-2025-10293 – nexist – Keyy Two Factor Authentication (like Clef)

October 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10299 – hakik – WPBifröst – Instant Passwordless Temporary Login Links

October 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10051 – themeinwp – Demo Import Kit

October 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-11501 – markomaksym – Dynamically Display Posts

October 16, 2025
image
  • Vulnerabilities

CVE Alert: CVE-2025-10313 – jankimoradiya – Find And Replace content for WordPress

October 16, 2025
Copyright © All rights reserved. | CoverNews by AF themes.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
pixel