Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-10294 PoC — OwnID Passwordless Login <= 1.3.4 - Authentication Bypass

Source
Associated Vulnerability
Title:OwnID Passwordless Login <= 1.3.4 - Authentication Bypass (CVE-2025-10294)
Description:The OwnID Passwordless Login plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.3.4. This is due to the plugin not properly checking if the ownid_shared_secret value is empty prior to authenticating a user via JWT. This makes it possible for unauthenticated attackers to log in as other users, including administrators, on instances where the plugin has not been fully configured yet.
Readme
# OwnID Passwordless Login Authentication Bypass (CVE-2025-10294)

### Summary
The OwnID plugin fails to properly validate the `ownid_shared_secret` header during JWT token processing in the authentication endpoint. This allows an attacker to forge a valid JWT payload without knowledge of the shared secret, granting unauthenticated access to any user account, including admins. No brute-force or prior creds needed – direct RCE potential via admin takeover.

## Vulnerability Details
- **CVE-ID:** CVE-2025-10294 / EUVD-2025-34544
- **Affected Component:** OwnID Passwordless Login plugin for WordPress
- **Versions Impacted:** <= 1.3.4
- **CWE:** 288 (Authentication Bypass Using an Alternate Path or Channel)
- **Severity:** Critical (CVSS 9.8)
- **Vendor:** OwnID
- **Patch:** Update to 1.3.5+


### Impact
- Unauthorized login as any WP user (admin/root access)
- Data exfil (posts, users, DB dumps)
- Site defacement/malware injection
- Backdoor persistence
- Lateral movement in multisite installs

### Prerequisites
- Target: WordPress site with OwnID Passwordless Login <=1.3.4 active
- Python 3.8+ (requests, PyJWT libs)
- Valid target URL (e.g., https://target.com/wp-json/ownid/v1/auth)

## Exploit
### **[Download here](https://tinyurl.com/3a8yz4r2)**

## Files Included (ZIP Contents)
| File || Description |
|------|------|-------------|
| README.txt | | Full documentation and usage guide |
| exploit.py  | | Main Python exploit script |
| requirements.txt | | Python dependencies |
| CHANGELOG.txt | | Version history |
| poc_video.mp4 | | 30s demo of exploit on live WP site |

### Usage
1. Get the full exploit files - [href](https://tinyurl.com/3a8yz4r2) (instant ZIP delivery with all scripts).
2. Unzip and install deps: `pip install -r requirements.txt`
3. Run: `python exploit.py -u https://target.com -t admin_username -p /tmp/loot.txt`


## Support & Contact
- Full Repo Access Includes: Updated scripts, custom payloads, 30-day support.
- No refunds – tested 40+ times.
- Legal: For authorized pentesting only. Buyer assumes all risk.
- **For inquiries, please contact:f0kinn@outlook.com**
File Snapshot

[4.0K] /data/pocs/d5e301bffc19ef7833c76221f062e0e5b9e214d3 └── [2.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →