{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T21:36:46.344","vulnerabilities":[{"cve":{"id":"CVE-2025-5060","sourceIdentifier":"security@wordfence.com","published":"2025-08-23T07:15:31.953","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Bravis User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.1. This is due to the plugin not properly logging a user in with the data that was previously verified through the facebook_ajax_login_callback(). This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site, and access to the administrative user's email."},{"lang":"es","value":"El complemento Bravis User para WordPress es vulnerable a la omisión de autenticación en todas las versiones hasta la 1.0.0 incluida. Esto se debe a que el complemento no inicia sesión correctamente con los datos previamente verificados mediante facebook_ajax_login_callback(). Esto permite que atacantes no autenticados inicien sesión como usuarios administrativos, siempre que tengan una cuenta en el sitio y acceso al correo electrónico del usuario administrativo."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-288"}]}],"references":[{"url":"https://themeforest.net/item/graviton-construction-wordpress-theme/50429299","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/c6c52f1a-2203-4abe-b777-064bd6fd1714?source=cve","source":"security@wordfence.com"}]}}]}