This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Critical Auth Bypass in **JAY Login & Register** plugin. <br>π₯ **Consequences**: Attackers can bypass login checks entirely. Full system compromise is possible.β¦
π¦ **Affected**: WordPress Plugin **JAY Login & Register**. <br>π **Version**: **2.4.01** and earlier. <br>π’ **Vendor**: jayarsiech. If you use this plugin, you are vulnerable.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: Attackers gain **unauthorized access**. <br>π **Data**: Full read/write access to user accounts. <br>π **Impact**: High Confidentiality, Integrity, and Availability loss.β¦
π£ **Exploit**: **YES**. Public PoC exists. <br>π **Link**: [GitHub PoC](https://github.com/Nxploited/CVE-2025-14440). <br>β οΈ **Method**: Exploits via **Cookie** manipulation. Wild exploitation is likely imminent.
Q7How to self-check? (Features/Scanning)
π **Check**: Scan for plugin **JAY Login & Register**. <br>π **Version**: Verify if version is **β€ 2.4.01**. <br>π οΈ **Tool**: Use WPScan or manual code review of `jay-login-register-user-switching.php` around line 98.