CVE-2025-6441

CRITICAL
2025-07-24 [email protected]
9.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Apr 08, 2026 - 18:38 vuln.today
CVE Published
Jul 24, 2025 - 10:15 nvd
CRITICAL 9.8

DescriptionNVD

The Webinar Solution: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings | WebinarIgnition plugin for WordPress is vulnerable to unauthenticated login token generation due to a missing capability check on the webinarignition_sign_in_support_staff and webinarignition_register_support functions in all versions up to, and including, 4.03.32. This makes it possible for unauthenticated attackers to generate login tokens for arbitrary WordPress users under certain circumstances, issuing authorization cookies which can lead to authentication bypass.

AnalysisAI

Unauthenticated login token generation in WebinarIgnition plugin for WordPress (versions ≤4.03.32) allows remote attackers to bypass authentication and impersonate arbitrary users. The vulnerability stems from missing capability checks on support staff authentication functions, enabling attackers to generate valid login tokens and authorization cookies without credentials (CVSS:3.1 AV:N/AC:L/PR:N). EPSS data not provided; no confirmation of active exploitation (CISA KEV) at time of analysis. Public exploit code existence not confirmed, though technical details are available via WordPress plugin repository references.

Technical ContextAI

This vulnerability affects the WebinarIgnition WordPress plugin, a webinar management solution supporting live, evergreen, automated, and instant webinar formats with Zoom integration. The root cause is CWE-862 (Missing Authorization), specifically in two AJAX-accessible functions: webinarignition_sign_in_support_staff and webinarignition_register_support. These functions lack proper capability checks, allowing unauthenticated users to invoke privileged operations that generate WordPress authentication tokens. The vulnerable code resides in class-webinarignition.php (line 549), class.WebinarignitionAjax.php (line 769), and class.WebinarignitionManager.php (lines 53 and 1040). WordPress plugins using AJAX endpoints without nonce validation or capability verification are particularly susceptible to this authorization bypass pattern, as the WordPress REST API and admin-ajax.php handlers rely on developers to implement access controls explicitly.

Affected ProductsAI

WebinarIgnition plugin (full name: Webinar Solution: Create live/evergreen/automated/instant webinars, stream & Zoom Meetings) for WordPress versions 4.03.32 and earlier are affected. The vulnerability impacts all historical versions up to and including 4.03.32. Affected installations are those with the plugin actively installed regardless of webinar configuration. WordPress sites with this plugin installed and accessible via the standard WordPress AJAX handler (admin-ajax.php) are exploitable. Vendor advisory and technical details available at Wordfence Threat Intelligence (https://www.wordfence.com/threat-intel/vulnerabilities/id/52c19707-df18-4239-af46-12ea5ee86a4b) and WordPress plugin repository changesets (https://plugins.trac.wordpress.org/changeset/3333177/).

RemediationAI

Immediately update WebinarIgnition plugin to version 4.03.33 or later, which addresses the missing capability checks per WordPress plugin changeset 3333177 committed on January 2025. Access WordPress admin dashboard, navigate to Plugins > Installed Plugins, locate WebinarIgnition, and apply available updates. If automatic updates are disabled, manually download the patched version from the official WordPress plugin repository. For sites unable to patch immediately, temporary risk reduction measures include disabling the WebinarIgnition plugin entirely until update deployment, implementing web application firewall (WAF) rules to block unauthenticated POST requests to admin-ajax.php with action parameters matching webinarignition_sign_in_support_staff or webinarignition_register_support, or restricting wp-admin and admin-ajax.php access to trusted IP addresses via server configuration. Review WordPress user accounts and access logs for unauthorized logins or privilege escalations occurring prior to patch application. Detailed technical changes available in plugin repository diff at https://plugins.trac.wordpress.org/changeset?old=3333045%40webinar-ignition&new=3333045%40webinar-ignition showing specific code modifications addressing the authorization flaw.

Share

CVE-2025-6441 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy