Overview
The cybersecurity landscape is an ever-evolving one with new vulnerabilities being discovered daily. The vulnerability we are focusing on for our blog post today is CVE-2025-6895, which exposes a critical security flaw in the Melapress Login Security Plugin for WordPress. This vulnerability is of high concern due to the wide use of WordPress and its plugins, making it a potential target for cybercriminals worldwide.
The Melapress Login Security plugin, a widely used security solution for WordPress sites, has been found to have an Authentication Bypass vulnerability. The severity of this vulnerability is particularly high because it allows an unauthenticated attacker with knowledge of an arbitrary user meta value to bypass authentication checks and log in as that user, potentially leading to system compromise or data leakage.
Vulnerability Summary
CVE ID: CVE-2025-6895
Severity: Critical (CVSS: 9.8)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: System compromise, data leakage
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
Melapress Login Security Plugin for WordPress | 2.1.0 to 2.1.1
How the Exploit Works
The vulnerability lies in the get_valid_user_based_on_token() function of the Melapress Login Security plugin. This function is missing an authorization check which would typically verify the authenticity of the user trying to log in. In absence of this check, an attacker can use a known user meta value to trick the function into verifying them as a valid user, thereby granting them unauthorized access to the system.
Conceptual Example Code
Here is a conceptual example of how an attacker might exploit this vulnerability:
POST /wp-login.php HTTP/1.1
Host: targetsite.com
Content-Type: application/x-www-form-urlencoded
log=known_meta_value&pwd=&wp-submit=Log+In
In this example, the attacker sends a HTTP POST request to the WordPress login page, using a known user meta value as the login (log). As the plugin fails to properly validate the user based on the provided meta value, it grants the attacker access to the user’s account.
Mitigation Guidance
To mitigate this vulnerability, users of the Melapress Login Security Plugin for WordPress should apply the vendor’s patch immediately. If unable to do so, it is recommended to use a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) as a temporary mitigation measure until the patch can be applied.