Authentication vulnerability in Spirit Framework 1.2.14

The plugin called “Spirit Framework” for WordPress has a security flaw in all versions up to 1.2.14. This means that anyone can bypass the login process and access the site without entering the correct credentials. The problem is caused by a function called “custom_actions()” which doesn’t check if the user is who they claim to be before allowing them to log in. This means that even users without an account can log in as any user, including administrators, as long as they know the administrator’s username.

Detected in:

Spirit Framework fixed vulnerable versions: >= * <= 1.2.14

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.