Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-10294 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical Auth Bypass in OwnID Plugin. The `ownid_shared_secret` validation is broken. πŸ“‰ **Consequences**: Attackers bypass login entirely. Full account takeover (including Admin).…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-288**: Authentication Bypass Using an Alternate Path or Channel. πŸ” **Flaw**: The plugin fails to properly validate the `ownid_shared_secret` header during JWT processing.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: victornavarro. πŸ“¦ **Product**: OwnID Passwordless Login (WordPress Plugin). πŸ“… **Affected**: Version **1.3.4 and earlier**. 🌐 **Platform**: WordPress sites using this specific plugin.…

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Unauthenticated access to **ANY** account. Includes **Admin** accounts. πŸ“‚ **Data**: Full read/write access to site content. πŸ”“ **Impact**: No brute-force needed. Direct forge JWT payload.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. 🚫 **Auth**: None required (Unauthenticated). βš™οΈ **Config**: No special setup needed. 🎯 **UI**: No user interaction required. 🌐 **Network**: Remote (AV:N). AC:L (Low Complexity).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp?**: **YES**. πŸ“‚ **PoCs Available**: Multiple GitHub repos (e.g., h4xnz, RedFoxNxploits). πŸ“₯ **Lab Envs**: Ready-to-use labs for testing. 🌍 **Wild Exploitation**: Likely active given CVSS 9.8 score.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Scan WP plugins for 'OwnID Passwordless Login'. 2. Verify version < 1.3.5. 3. Check for JWT auth endpoints. πŸ› οΈ **Tools**: Use WP scanners or manual code review for `ownid_shared_secret` validation.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Official Fix**: **YES**. πŸ“’ **Vendor**: victornavarro/WordPress. πŸ“ **Status**: CVE published. Patch expected/available in version > 1.3.4. πŸ”— **Ref**: WordPress plugin repo & Wordfence intel.…

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1. **Disable** the OwnID plugin immediately. 🚫 2. Remove plugin files if possible. 3. Monitor admin logs for suspicious JWT requests. πŸ›‘ 4. Force password reset for all users.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL** (CVSS 9.8). 🚨 **Priority**: **IMMEDIATE ACTION**. πŸ“‰ **Risk**: High. Unauthenticated RCE potential. πŸ“… **Published**: Oct 2025. ⏳ **Time**: Zero-day style impact. Do not wait.…