Videospirecore Theme Plugin Vulnerability (High) – CVE-2025-15096

Videospirecore Theme Plugin Vulnerability (High) – CVE-2025-15096

by | Feb 11, 2026 | Plugins

Attack Vectors

CVE-2025-15096 is a High-severity (CVSS 8.8) vulnerability in the Videospirecore Theme Plugin (slug: videospirecore) affecting versions up to and including 1.0.6. It can be exploited remotely over the internet by an authenticated user with Subscriber-level access (or higher), without any user interaction.

In practical terms, this means any low-privilege account—such as a basic subscriber account created for gated content, events, marketing campaigns, or customer portals—could be used as a foothold. From there, an attacker could target higher-value accounts, including administrators, by altering account details in a way that enables takeover.

Security Weakness

The core weakness is improper identity validation before allowing updates to sensitive user details (specifically email addresses). Because the Videospirecore Theme Plugin does not properly confirm that the requester is authorized to change a given user’s email, an authenticated attacker can change the email address of an arbitrary user, including an administrator.

Once an administrator’s email is changed, the attacker can leverage standard password reset flows to reset the password and gain full control of that account. This is a privilege escalation via account takeover, and it is especially risky because it uses common site functionality (account updates and password resets) rather than noisy or complex exploitation.

Technical or Business Impacts

With administrator access, an attacker can effectively control the WordPress site and its business outcomes. This can include defacing public pages, altering campaign landing pages, inserting unauthorized tracking or redirects, creating hidden administrator accounts, or modifying content in ways that damage brand credibility and conversion performance.

From a business-risk perspective, impacts may include loss of customer trust, downtime during incident response, reputational harm, and potential compliance exposure if the site stores or processes personal data. Because the CVSS vector indicates high impact to confidentiality, integrity, and availability, the potential for data exposure, tampering, and operational disruption should be treated as material risk—especially for executive and compliance stakeholders.

Remediation note: there is no known patch available for affected versions (<= 1.0.6). Based on your organization’s risk tolerance, it may be appropriate to uninstall the Videospirecore Theme Plugin and replace it with an alternative. For details and ongoing updates, reference the official records at CVE-2025-15096 and the vendor analysis at Wordfence Threat Intel.

Similar Attacks

Account takeover and privilege escalation through weak authorization checks in WordPress plugins is a recurring pattern. For broader context, the WordPress ecosystem has documented multiple high-impact plugin issues that led to site compromise, including cases where attackers gained admin-level control and modified site behavior or content:

Essential Addons for Elementor – privilege escalation (Wordfence)

WooCommerce Payments – high-impact compromise scenario (Wordfence)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers