CVE-2025-5955

8.1 HIGH

📋 TL;DR

The Service Finder SMS System WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any user without verifying phone numbers. This affects all WordPress sites using this plugin up to version 2.0.0. Attackers can gain unauthorized access to user accounts and potentially administrative privileges.

💻 Affected Systems

Products:
  • Service Finder SMS System WordPress Plugin
Versions: All versions up to and including 2.0.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. No specific OS or web server requirements.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to WordPress sites, enabling complete site takeover, data theft, malware injection, and defacement.

🟠

Likely Case

Attackers compromise user accounts to steal personal data, post unauthorized content, or escalate privileges to gain administrative control.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the affected WordPress instance without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass vulnerabilities are frequently weaponized quickly. The unauthenticated nature makes exploitation trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.0.0

Vendor Advisory: https://themeforest.net/item/service-finder-service-and-business-listing-wordpress-theme/15208793

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Service Finder SMS System'
4. Click 'Update Now' if update available
5. If no update, deactivate and delete the plugin immediately

🔧 Temporary Workarounds

Disable Plugin

all

Deactivate the vulnerable plugin to prevent exploitation

wp plugin deactivate service-finder-sms-system

Restrict Access

all

Block access to plugin files via web server configuration

# Add to .htaccess for Apache:
<FilesMatch "service-finder.*">
Order Allow,Deny
Deny from all
</FilesMatch>
# Add to nginx config:
location ~ /wp-content/plugins/service-finder.* {
    deny all;
}

🧯 If You Can't Patch

  • Immediately deactivate the Service Finder SMS System plugin in WordPress admin
  • Implement web application firewall rules to block authentication bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Service Finder SMS System' version 2.0.0 or earlier

Check Version:

wp plugin get service-finder-sms-system --field=version

Verify Fix Applied:

Verify plugin is either updated to version after 2.0.0 or completely removed from the plugins directory

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts without phone verification
  • Multiple failed login attempts followed by successful login from same IP
  • User logins from unexpected IP addresses or locations

Network Indicators:

  • HTTP POST requests to plugin authentication endpoints without proper parameters
  • Unusual traffic patterns to /wp-content/plugins/service-finder/ paths

SIEM Query:

source="wordpress.log" AND ("service-finder" OR "sms-system") AND ("login" OR "authenticate") AND NOT "phone_verification"

🔗 References

📤 Share & Export