The Browse As plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.2. This is due to incorrect authentication checking in the 'IS_BA_Browse_As::notice' function with the 'is_ba_original_user_COOKIEHASH' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the user id.
Metrics
Affected Vendors & Products
References
History
Fri, 30 May 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 30 May 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Browse As plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.2. This is due to incorrect authentication checking in the 'IS_BA_Browse_As::notice' function with the 'is_ba_original_user_COOKIEHASH' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the user id. | |
Title | Browse As <= 0.2 - Authenticated (Subscriber+) Authentication Bypass via Cookie | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-30T11:15:10.217Z
Updated: 2025-05-30T12:16:17.522Z
Reserved: 2025-05-26T05:12:25.477Z
Link: CVE-2025-5190

Updated: 2025-05-30T12:15:58.716Z

Status : Awaiting Analysis
Published: 2025-05-30T12:15:21.103
Modified: 2025-05-30T16:31:03.107
Link: CVE-2025-5190

No data.