5.3
CVE-2024-13688
- EPSS 0.07%
- Veröffentlicht 28.04.2025 06:15:15
- Zuletzt bearbeitet 14.05.2025 14:52:29
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Admin and Site Enhancements (ASE) <= 7.6.9 - Password Protection Bypass
The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 uses a hardcoded password in its Password Protection feature, allowing attacker to bypass the protection offered via a crafted request
Mögliche Gegenmaßnahme
Admin and Site Enhancements (ASE): Update to version 7.6.10, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Admin and Site Enhancements (ASE)
Version
* - 7.6.9
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpase ≫ Admin And Site Enhancements SwEditionfree SwPlatformwordpress Version < 7.6.10
Wpase ≫ Admin And Site Enhancements SwEditionpro SwPlatformwordpress Version < 7.6.10
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.217 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.