CVE-2025-10293
WordPress · WordPress Multiple Products
A high-severity vulnerability has been identified in the Keyy Two Factor Authentication plugin for WordPress, which allows for privilege escalation.
Executive summary
A high-severity vulnerability has been identified in the Keyy Two Factor Authentication plugin for WordPress, which allows for privilege escalation. An unauthenticated attacker could exploit this flaw to bypass security controls and take over user accounts, including those with administrative privileges, leading to a full compromise of the affected website.
Vulnerability
The Keyy Two Factor Authentication plugin contains a critical flaw in its authentication mechanism. An attacker can manipulate the authentication process to bypass the second-factor requirement and impersonate any user on the WordPress site. This is achievable by intercepting and modifying the authentication handshake or by exploiting a weakness in how the plugin validates the user session, allowing the attacker to escalate their privileges to that of the targeted account, such as an administrator.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant risk to the organization. Successful exploitation could lead to a complete compromise of the corporate website. Potential consequences include theft of sensitive data (customer information, intellectual property), unauthorized content modification, website defacement, and the use of the compromised server to launch further attacks or distribute malware, resulting in severe reputational damage and potential financial loss.
Remediation
Immediate Action: Immediately update the "Keyy Two Factor Authentication" plugin to the latest patched version provided by the vendor. If this plugin is no longer business-critical or has been abandoned, it should be deactivated and completely removed from the WordPress installation to eliminate the attack surface.
Proactive Monitoring: Monitor WordPress authentication logs for unusual or suspicious login patterns, such as multiple failed login attempts followed by a success, or logins for administrative accounts from unexpected IP addresses or geographic locations. Regularly audit user accounts for unauthorized privilege changes or the creation of new, unknown administrative users.
Compensating Controls: If immediate patching is not feasible, disable the vulnerable plugin immediately and revert to standard WordPress password authentication or implement a different, secure two-factor authentication solution. Deploy a Web Application Firewall (WAF) with rules designed to detect and block account takeover attempts. Restrict access to the WordPress administrative dashboard (/wp-admin) to trusted IP addresses only.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.8 and the potential for a complete site compromise, this vulnerability should be treated as a critical priority. Although it is not currently listed on the CISA KEV catalog, organizations are strongly advised to apply the recommended remediation actions immediately. All WordPress sites using the "Keyy Two Factor Authentication" plugin must be identified and patched or have the plugin removed without delay to prevent potential exploitation.