CVE-2025-58595

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in the WordPress 'All In One Login' plugin by spoofing identities, enabling unauthorized access to admin areas. It affects all WordPress sites using the plugin version 2.0.8 or earlier. Attackers can potentially gain administrative privileges without valid credentials.

💻 Affected Systems

Products:
  • WordPress All In One Login Plugin (change-wp-admin-login)
Versions: n/a through <= 2.0.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with the vulnerable plugin version installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain full administrative access, install backdoors, steal sensitive data, deface websites, or use the compromised site for further attacks.

🟠

Likely Case

Unauthorized access to WordPress admin dashboard allowing content modification, plugin/theme installation, user creation, and potential data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication controls, and monitoring that detects unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is publicly documented with technical details available, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.0.8

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/change-wp-admin-login/vulnerability/wordpress-all-in-one-login-plugin-2-0-8-bypass-vulnerability-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'All In One Login' plugin. 4. Click 'Update Now' if available, or delete and install latest version from WordPress repository.

🔧 Temporary Workarounds

Disable Vulnerable Plugin

all

Temporarily disable the plugin until patched version is available

wp plugin deactivate change-wp-admin-login

Restrict Admin Access

all

Limit admin access to specific IP addresses using .htaccess or web server configuration

# Add to .htaccess: Order Deny,Allow\nDeny from all\nAllow from 192.168.1.100

🧯 If You Can't Patch

  • Immediately disable the 'All In One Login' plugin and use WordPress default authentication
  • Implement Web Application Firewall (WAF) rules to block authentication bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'All In One Login' version <= 2.0.8

Check Version:

wp plugin list --name=change-wp-admin-login --field=version

Verify Fix Applied:

Verify plugin version is >2.0.8 and test authentication functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts without valid credentials
  • Admin access from unexpected IP addresses
  • Multiple failed login attempts followed by successful admin access

Network Indicators:

  • HTTP requests to wp-admin with spoofed authentication parameters
  • Unusual traffic patterns to login endpoints

SIEM Query:

source="wordpress.log" AND ("wp-admin" OR "wp-login.php") AND status=200 AND (user_agent CONTAINS "curl" OR user_agent CONTAINS "wget" OR user_agent="-")

🔗 References

📤 Share & Export