vulnerability
WordPress Plugin: jay-login-register: CVE-2025-14440: Reliance on Cookies without Validation and Integrity Checking
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Dec 12, 2025 | Dec 22, 2025 | Dec 22, 2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 12, 2025
Added
Dec 22, 2025
Modified
Dec 22, 2025
Description
The JAY Login and Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
Solution
jay-login-register-plugin-cve-2025-14440
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.