Zero-Click Admin Access: CVE-2025-5947 Threatens WordPress Booking Sites

The WordPress Service Finder Bookings plugin has been found to have a critical authentication bypass vulnerability (CVE-2025-5947) that affects all versions before 6.1. Unauthenticated attackers can assume complete control of impacted websites by impersonating administrators due to this vulnerability, which is brought on by inadequate cookie validation. Since it was made public on June 8, 2025, the vulnerability has been actively abused in the wild, endangering over 6,000 installations, especially small businesses and service providers who depend on WordPress for scheduling and payment processing. Widespread exploitation persists despite the July 17, 2025, patch, highlighting the vital necessity for quick updates and security precautions.

Technical Description

Due to incorrect validation of the original_user_id cookie within the service_finder_switch_back() function, the Service Finder WordPress theme (versions < 6.0) is vulnerable to a critical authentication bypass vulnerability (CVSS 9.8) known as CVE-2025-5947. This vulnerability enables unauthenticated attackers to utilize a specially constructed HTTP GET request with the switch_back=1 argument to impersonate any user, including administrators. Attackers can manipulate information, upload PHP files, export databases, and create accounts if they have full administrative capabilities.Since August 1, there have been over 13,800 attempts to exploit the vulnerability, which was found by researcher “Foxyyy” and fixed in version 6.1 released on July 17, 2025. The majority of these attempts have come from five IP addresses. The vulnerability requires no valid credentials and targets EBS versions 12.2.3 to 12.2.14. The public release of an exploit package and associated IoCs has enhanced the possibility of opportunistic scanning and mass exploitation.

CVE CVSS Vulnerability Type Affected Product Patch Version
CVE-2025-5947 9.8 (Critical) Authentication Bypass Service Finder WordPress Theme (≤ v6.0) 6.1

Exploitation Demonstration:

  • In order to find targets and gather version and configuration data, attackers searched the internet for websites using the Service Finder theme or plugin.
  • They verified that the account-switching capability utilized by the exploit was present in susceptible installations (versions < 6.0).
  • An unauthenticated session elevation was started by impersonating an existing user using a crafted HTTP request that abused the account-switch mechanism.
  • If the exploitation was successful, administrator-level access was granted right away, giving complete control over the site’s settings, content, and file operations.
  • Further, to evade detection, operators deployed payloads, changed or deleted logs, and built persistence (new admin accounts or backdoors).

Ease of Exploitation:

As it targets an easily identified logic error in cookie handling, requires no authentication or special privileges, and can be probed with simple HTTP requests, CVE-2025-5947 is extremely easy to exploit. These conditions allow automated scanners and low-skill actors to find and attack vulnerable sites at scale. Site operators should assume immediate risk until patches (v6.1) are applied and compensating controls (WAF, IP blocklists, log monitoring) are in place because the vulnerability was fast weaponized and resulted in thousands of automated attempts from a small number of IPs and sustained daily attack volumes, which together mean exploitation is low-effort, high-velocity.

Conclusion:

The critical, actively exploited authentication bypass known as CVE-2025-5947 puts thousands of Service Finder sites at risk and has to be fixed right away: If the site ran a vulnerable version, assume compromise, apply the vendor patch (Service Finder v6.1) or remove/disable the component immediately, rotate credentials and keys, implement compensating controls (WAF rules, targeted IP blocklists, enhanced monitoring and alerting), and conduct a forensic review of accounts and logs, restoring from known-clean backups where required. Since attackers with administrator access have the ability to remove traces, prompt action and careful validation are crucial. Treat this occurrence as a high priority, notify stakeholders and customers as needed, and keep the evidence for inquiry.

Impact

By taking advantage of CVE-2025-5947, attackers can gain unauthenticated administrator access and complete control on impacted Service Finder sites (≤ v6.0). Random content and configuration changes, the establishment of backdoors or persistent admin accounts, PHP uploads and remote code execution, database export/data theft, manipulation of payments and reservations, and the capacity to remove forensic evidence are among the repercussions. The vulnerability poses an urgent and serious operational, financial, and reputational risk to site owners and their clients, with a CVSS of 9.8, over 6,000 deployed sites at risk, and about 13,800 documented exploitation attempts (with daily spikes exceeding 1,500).

IOC and Context Details

Topics Details
Tactic Name Initial Access, Privilege Escalation, Persistence
Technique Name Exploit Public-Facing Application (MITRE T1190)
Authentication bypass via application logic and cookie trust
Sub Technique Name Web authentication bypass through unsafe cookie handling
Attack Type Vulnerability
Targeted Applications Service Finder WordPress theme/plugin
Region Impacted Global
Industry Impacted Small and medium service providers
Local businesses using booking and payment features
IOC’s IP Addresses
5[.]189[.]221[.]98
185[.]109[.]21[.]157
192[.]121[.]16[.]196
194[.]68[.]32[.]71
178[.]125[.]204[.]198
CVE CVE-2025-5947

Recommended Actions

  • Upgrade to Service Finder Bookings Plugin version 6.1 or newer to eliminate the critical authentication bypass vulnerability.
  • While Web Application Firewalls (WAFs) and security tools like Wordfence can help mitigate attacks, they are not substitutes for applying security updates.
  • Examine access records for unusual login attempts, changes in user roles, or unauthorized administrative activities.
  • Ensure all administrator accounts use strong, unique passwords and activate multi-factor authentication (MFA) to enhance security.
  • Conduct frequent security assessments of all WordPress components, keep an up-to-date inventory of software versions, and stay informed about vendor security updates and best practices.

References

https://www.bleepingcomputer.com/news/security/hackers-exploit-auth-bypass-in-service-finder-wordpress-theme/