With so many websites using WordPress with plugins installed, security is a key component often overlooked, especially when dealing with user authentication. CVE-2025-1061 highlights a critical vulnerability in a common plugin used to let users sign in with social accounts such as Gmail and Apple. This vulnerability allows unauthenticated attackers to bypass authentication, posing a significant threat to websites using this plugin. With an alarming CVSS score of 9.8, this issue demands immediate attention, particularly given its presence in over 300,000 WordPress installations.

Technical Overview:
This widely-used WordPress plugin simplifies user registration and login by allowing visitors to authenticate using their social media profiles, such as Facebook, Google, and X (formerly Twitter). However, a flaw in the plugin’s Apple OAuth authentication process has been identified. The vulnerability arises from insufficient verification of the user data supplied during the Apple OAuth authentication request. This loophole can be exploited by attackers to log in as any existing user on the site, including administrators, provided they have access to the user’s email address.
EPSS and Threat Analysis:
While the Exploit Prediction Scoring System (EPSS) score for this specific CVE is not provided, the critical CVSS score of 9.8 underscores the severity of the threat. The vulnerability’s potential impact is significant, as it could allow attackers to gain unauthorised access to websites, leading to data breaches, defacement, or complete site takeover. Given the widespread use of the plugin, the risk is amplified, making it crucial for site administrators to act swiftly.
Remediation Steps:
To protect your WordPress site from this vulnerability, follow these recommended steps:
1. Update the Plugin: Immediately update Nextend Social Login Pro to version 3.1.17 or a later patched version. This update addresses the authentication bypass issue.
2. Review User Access: Check for unauthorised logins or user roles and permissions changes. Ensure that all user accounts are legitimate and secure.
3. Implement Two-Factor Authentication (2FA): Enhance your site’s security by enabling 2FA for all user accounts, particularly for administrators.
4. Regular Security Audits: Conduct regular security audits of your WordPress site to identify and address potential vulnerabilities.
For official guidance and updates, refer to the Wordfence advisory.
By taking these steps, you can safeguard your website against potential exploitation and ensure that your users’ data remains secure.