CVE-2024-13688

The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 uses a hardcoded password in its Password Protection feature, allowing attacker to bypass the protection offered via a crafted request
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:free:wordpress:*:*
cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:pro:wordpress:*:*

History

14 May 2025, 14:52

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/19051d08-16b0-466c-976b-be7b076e8e92/ - () https://wpscan.com/vulnerability/19051d08-16b0-466c-976b-be7b076e8e92/ - Exploit, Third Party Advisory
First Time Wpase
Wpase admin And Site Enhancements
CPE cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:free:wordpress:*:*
cpe:2.3:a:wpase:admin_and_site_enhancements:*:*:*:*:pro:wordpress:*:*
CWE CWE-798

28 Apr 2025, 18:15

Type Values Removed Values Added
Summary
  • (es) El complemento Admin and Site Enhancements (ASE) WordPress anterior a la versión 7.6.10 utiliza una contraseña codificada en su función de protección de contraseña, lo que permite a un atacante eludir la protección ofrecida mediante una solicitud manipulada.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3

28 Apr 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-28 06:15

Updated : 2025-05-14 14:52


NVD link : CVE-2024-13688

Mitre link : CVE-2024-13688

CVE.ORG link : CVE-2024-13688


JSON object : View

Products Affected

wpase

  • admin_and_site_enhancements
CWE
CWE-798

Use of Hard-coded Credentials