The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 uses a hardcoded password in its Password Protection feature, allowing attacker to bypass the protection offered via a crafted request
History

Wed, 14 May 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpase
Wpase admin And Site Enhancements
Weaknesses CWE-798
CPEs cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:free:wordpress:*:*
cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:pro:wordpress:*:*
Vendors & Products Wpase
Wpase admin And Site Enhancements

Mon, 28 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 28 Apr 2025 06:15:00 +0000

Type Values Removed Values Added
Description The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 uses a hardcoded password in its Password Protection feature, allowing attacker to bypass the protection offered via a crafted request
Title Admin and Site Enhancements (ASE) < 7.6.10 - Password Protection Bypass
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-04-28T06:00:01.714Z

Updated: 2025-04-28T17:24:45.710Z

Reserved: 2025-01-23T19:01:03.389Z

Link: CVE-2024-13688

cve-icon Vulnrichment

Updated: 2025-04-28T17:23:52.589Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-28T06:15:15.617

Modified: 2025-05-14T14:52:29.967

Link: CVE-2024-13688

cve-icon Redhat

No data.