CVE-2025-13615

9.8 CRITICAL

📋 TL;DR

This vulnerability in the StreamTube Core WordPress plugin allows unauthenticated attackers to change user passwords, including administrator accounts, potentially leading to complete site takeover. It affects WordPress sites using StreamTube Core plugin versions up to 4.78 with 'registration password fields' enabled in theme options. The vulnerability stems from improper authorization controls that let users access system resources they shouldn't.

💻 Affected Systems

Products:
  • StreamTube Core WordPress Plugin
Versions: Up to and including version 4.78
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ✅ No
Notes: Exploitation requires 'registration password fields' to be enabled in theme options. This is not the default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through administrator account takeover, leading to data theft, defacement, malware injection, or ransomware deployment.

🟠

Likely Case

Unauthenticated attackers change passwords for administrator or other privileged accounts, gaining unauthorized access to modify content, install malicious plugins, or steal sensitive data.

🟢

If Mitigated

If 'registration password fields' are disabled in theme options, the vulnerability cannot be exploited, though the underlying code flaw remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit once the specific endpoint and parameters are identified. No authentication is required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.79 or later

Vendor Advisory: https://themeforest.net/item/streamtube-responsive-video-wordpress-theme/33821786

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find StreamTube Core plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download latest version from vendor and manually update.

🔧 Temporary Workarounds

Disable Registration Password Fields

all

Disable the vulnerable feature in theme options to prevent exploitation.

Temporary Plugin Deactivation

all

Deactivate the StreamTube Core plugin until patched, though this may break site functionality.

🧯 If You Can't Patch

  • Disable 'registration password fields' in StreamTube theme options immediately.
  • Implement web application firewall (WAF) rules to block requests to vulnerable plugin endpoints.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for StreamTube Core version. If version is 4.78 or lower, site is vulnerable if registration password fields are enabled.

Check Version:

wp plugin list --name=streamtube-core --field=version

Verify Fix Applied:

After update, confirm StreamTube Core plugin version is 4.79 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to StreamTube Core plugin endpoints, especially password change attempts from unauthenticated IPs.

Network Indicators:

  • HTTP requests containing 'streamtube' or plugin-specific parameters related to password changes without authentication.

SIEM Query:

source="web_logs" AND (uri_path="/wp-content/plugins/streamtube-core/*" OR user_agent="*streamtube*") AND (method="POST" AND status=200)

🔗 References

📤 Share & Export