CVE-2025-11522

The · The Search & Go - Directory WordPress Theme

A critical authentication bypass vulnerability has been identified in The Search & Go - Directory WordPress Theme, allowing unauthenticated attackers to take over user accounts, including those with a.

Executive summary

A critical authentication bypass vulnerability has been identified in The Search & Go - Directory WordPress Theme, allowing unauthenticated attackers to take over user accounts, including those with administrative privileges. Successful exploitation could lead to a complete compromise of the affected WordPress site, enabling data theft, website defacement, and further attacks originating from the trusted web server. Immediate patching is required to mitigate the significant risk posed by this flaw.

Vulnerability

The vulnerability exists due to an insufficient authorization check within a user management function, likely related to password reset or profile updates. An unauthenticated attacker can craft a specific request to modify the account details of an existing user, such as changing the associated email address or directly setting a new password. By targeting an administrator account, the attacker can bypass all authentication mechanisms and gain full administrative control over the WordPress application.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation can have a severe and direct impact on the business. An attacker with administrative access can steal sensitive user data, customer information, and intellectual property; deface the website causing significant reputational damage; inject malicious code to attack site visitors; and use the compromised server as a pivot point for further attacks on the internal network. The potential consequences include regulatory fines for data breaches, loss of customer trust, and significant financial costs for incident response and recovery.

Remediation

Immediate Action: Immediately update The Search & Go - Directory WordPress Theme to the latest patched version provided by the vendor. After patching, it is crucial to review all administrator-level accounts for any unauthorized changes to passwords, email addresses, or user roles.

Proactive Monitoring: Implement enhanced logging and monitoring for the WordPress application. Specifically, monitor for an unusual volume of password reset requests, profile update attempts from unknown IP addresses, and unexpected changes to high-privilege user accounts. Review web server access logs for suspicious POST requests to user profile or account management pages.

Compensating Controls: If immediate patching is not feasible, consider the following temporary measures:

  • Implement a Web Application Firewall (WAF) with rules to block malicious requests targeting user account functions.
  • Restrict access to the WordPress admin login page (/wp-admin/) to trusted IP addresses only.
  • Enforce Multi-Factor Authentication (MFA) for all user accounts, especially administrators, as this may hinder an attacker's ability to log in even after a successful password change.
  • Temporarily disable user registration and profile editing functionality if it is not critical to business operations.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical CVSS score of 9.8 and the risk of complete system compromise, this vulnerability requires immediate attention. We strongly recommend that organizations apply the vendor-supplied patch to all affected websites without delay. Although there is no evidence of active exploitation, the severity of this flaw makes it a high-priority target. A post-patch audit of all administrative and privileged user accounts should be conducted to ensure no compromise has already occurred.