CVE-2025-13390
CRITICAL EXPLOITED NUCLEIWpdirectorykit WP Directory Kit < 1.4.4 - Authentication Bypass
Title source: ruleDescription
The WP Directory Kit plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.4.4 due to incorrect implementation of the authentication algorithm in the "wdk_generate_auto_login_link" function. This is due to the feature using a cryptographically weak token generation mechanism. This makes it possible for unauthenticated attackers to gain administrative access and achieve full site takeover via the auto-login endpoint with a predictable token.
Exploits (3)
Nuclei Templates (1)
WP Directory Kit <= 1.4.4 - Authentication Bypass
CRITICALVERIFIEDby maxthepm
Shodan:
html:"/wp-content/plugins/wpdirectorykit"
FOFA:
body:/wp-content/plugins/wpdirectorykit
References (4)
Scores
CVSS v3
10.0
EPSS
0.3672
EPSS Percentile
97.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2025-12-03
CWE
CWE-303
Status
published
Products (1)
wpdirectorykit/wp_directory_kit
< 1.4.4
Published
Dec 03, 2025
Tracked Since
Feb 18, 2026