CVE-2025-60098

6.5 MEDIUM

📋 TL;DR

This CVE describes a missing authorization vulnerability in the Theme My Login WordPress plugin that allows attackers to bypass access controls. Attackers could potentially access restricted functionality or data they shouldn't have permission to view. This affects all WordPress sites using Theme My Login versions up to 7.1.12.

💻 Affected Systems

Products:
  • Theme My Login WordPress Plugin
Versions: n/a through 7.1.12
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to WordPress sites, allowing them to modify content, install malicious plugins, steal sensitive data, or take complete control of the website.

🟠

Likely Case

Attackers access user accounts, modify user profiles, extract personal information, or perform unauthorized actions within the plugin's functionality.

🟢

If Mitigated

Attackers are limited to accessing only non-sensitive plugin features or are blocked entirely by additional security layers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some understanding of WordPress authentication mechanisms but doesn't require advanced technical skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.13 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/theme-my-login/vulnerability/wordpress-theme-my-login-plugin-7-1-12-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Theme My Login and click 'Update Now'. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the Theme My Login plugin until patching is possible

wp plugin deactivate theme-my-login

Restrict Access via WAF

all

Configure web application firewall rules to block suspicious access patterns to the plugin

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can access the WordPress admin interface
  • Enable detailed logging and monitoring for unauthorized access attempts to the plugin

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Theme My Login → View version details

Check Version:

wp plugin get theme-my-login --field=version

Verify Fix Applied:

Verify plugin version is 7.1.13 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful access to restricted plugin endpoints
  • Unauthorized users accessing /wp-content/plugins/theme-my-login/ paths

Network Indicators:

  • Unusual traffic patterns to Theme My Login plugin endpoints from unexpected IP addresses

SIEM Query:

source="wordpress.log" AND ("theme-my-login" OR "tml_") AND (status=200 OR status=302) AND user_agent NOT IN ["admin_user_agents"]

🔗 References

📤 Share & Export