CVE-2025-14440
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2Description
The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
Analysis
Authentication bypass in JAY Login & Register plugin for WordPress versions ≤2.4.01 allows unauthenticated remote attackers to impersonate any site user, including administrators, by exploiting flawed cookie validation in the user-switching function. Attackers require only knowledge of target user IDs to gain complete account access without credentials. No public exploit identified at time of analysis.
Technical Context
CWE-565 flaw in jay_login_register_process_switch_back function permits cookie manipulation to bypass authentication checks. The function improperly validates the jay_login_register_process_switch_back cookie value, enabling arbitrary user ID substitution. CVSS vector PR:N confirms unauthenticated attack surface with network accessibility and low complexity.
Affected Products
JAY Login & Register plugin for WordPress, versions 2.4.01 and earlier. CPE: cpe:2.3:a:jaylabssoft:jay_login_\&_register:*:*:*:*:*:wordpress:*:* (versions through 2.4.01). Vendor: JayLabsSoft.
Remediation
Vendor-released patch: version 2.4.02 addresses authentication bypass via Trac changeset 3418754, which corrects cookie validation logic in the user-switching mechanism (https://plugins.trac.wordpress.org/changeset/3418754/). Immediately upgrade to JAY Login & Register 2.4.02 or later through WordPress dashboard. For sites unable to patch immediately, deactivate the plugin entirely until upgrade is feasible, as no effective workaround exists for this critical authentication flaw. Audit user activity logs for suspicious login patterns or privilege escalations during vulnerable period. Full vendor advisory available at https://www.wordfence.com/threat-intel/vulnerabilities/id/928877a6-eeeb-4ed5-900b-9b1560e1bf87?source=cve confirming remediation details and scope.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today