Description
The Brave Conversion Engine (PRO) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 0.7.7. This is due to the plugin not properly restricting a claimed identity while authenticating with Facebook. This makes it possible for unauthenticated attackers to log in as other users, including administrators.
Published: 2025-08-02
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass to Administrator
Action: Apply Patch
AI Analysis

Impact

The vulnerability in the Brave Conversion Engine (PRO) plugin allows an attacker who is not logged in to authenticate as any existing user on the WordPress site. By exploiting a flaw in the way the plugin validates a claimed identity from Facebook, the attacker can assume the privileges of that user, including administrative rights. This constitutes a serious loss of confidentiality, integrity, and availability because an adversary can modify content, install further malware or exfiltrate data. Based on the description, it is inferred that the attacker would exploit the Facebook authentication flow to achieve this bypass.

Affected Systems

WordPress sites running the Brave Conversion Engine (PRO) plugin, all released versions up to and including 0.7.7. Any site that has not upgraded past this version is susceptible. The issue is tied to the Facebook authentication workflow within the plugin.

Risk and Exploitability

The CVSS score of 9.8 places this flaw in the critical range, and while the EPSS score is below 1% indicating a low current exploitation probability, the lack of active defensive measures means that once discovered, attackers can rapidly exploit the open authentication path. The vulnerability is not listed in the CISA KEV catalog, but the combination of its high severity and confirmed authentication bypass makes it a high priority for remediation. An attacker can simply send a crafted request to the login endpoint using a forged Facebook token, bypassing any credential checks and receiving an authenticated session with administrative privileges. Based on the description, it is inferred that this exploitation method involves manipulating the Facebook authentication flow.

Generated by OpenCVE AI on April 21, 2026 at 19:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Brave Conversion Engine (PRO) plugin to version 0.7.8 or later, which resolves the authentication bypass.
  • Temporarily disable Facebook authentication or remove the Facebook integration feature until the plugin can be updated, to stop the attack vector.
  • Audit user accounts for anomalies and reset any accounts that may have been compromised; consider regenerating all administrative passwords.

Generated by OpenCVE AI on April 21, 2026 at 19:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23435 The Brave Conversion Engine (PRO) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 0.7.7. This is due to the plugin not properly restricting a claimed identity while authenticating with Facebook. This makes it possible for unauthenticated attackers to log in as other users, including administrators.
History

Tue, 05 Aug 2025 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Brave
Brave brave
Wordpress
Wordpress wordpress
Vendors & Products Brave
Brave brave
Wordpress
Wordpress wordpress

Mon, 04 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 02 Aug 2025 11:30:00 +0000

Type Values Removed Values Added
Description The Brave Conversion Engine (PRO) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 0.7.7. This is due to the plugin not properly restricting a claimed identity while authenticating with Facebook. This makes it possible for unauthenticated attackers to log in as other users, including administrators.
Title Brave Conversion Engine (PRO) <= 0.7.7 - Authentication Bypass to Administrator
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:56:35.243Z

Reserved: 2025-07-16T13:31:51.303Z

Link: CVE-2025-7710

cve-icon Vulnrichment

Updated: 2025-08-04T13:23:06.768Z

cve-icon NVD

Status : Deferred

Published: 2025-08-02T12:15:28.280

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-7710

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T19:30:06Z

Weaknesses