First published: Mon Apr 28 2025(Updated: )
The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 uses a hardcoded password in its Password Protection feature, allowing attacker to bypass the protection offered via a crafted request
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Admin and Site Enhancements (ASE) Pro Plugin | <7.6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13688 has been classified as a high severity vulnerability due to the potential for bypassing security protections.
To fix CVE-2024-13688, update the Admin and Site Enhancements plugin to version 7.6.10 or later.
CVE-2024-13688 involves the use of a hardcoded password in the Password Protection feature, enabling unauthorized access.
CVE-2024-13688 affects users of the Admin and Site Enhancements plugin versions prior to 7.6.10.
Attackers can exploit CVE-2024-13688 to bypass password protection and gain unauthorized access to protected areas.