Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vv4w-9vmx-jmwp

Опубликовано: 09 июл. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The Support Board plugin for WordPress is vulnerable to unauthorized access/modification/deletion of data due to use of hardcoded default secrets in the sb_encryption() function in all versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to bypass authorization and execute arbitrary AJAX actions defined in the sb_ajax_execute() function. An attacker can use this vulnerability to exploit CVE-2025-4828 and various other functions unauthenticated.

The Support Board plugin for WordPress is vulnerable to unauthorized access/modification/deletion of data due to use of hardcoded default secrets in the sb_encryption() function in all versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to bypass authorization and execute arbitrary AJAX actions defined in the sb_ajax_execute() function. An attacker can use this vulnerability to exploit CVE-2025-4828 and various other functions unauthenticated.

EPSS

Процентиль: 48%
0.00249
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-639

Связанные уязвимости

CVSS3: 9.8
nvd
7 месяцев назад

The Support Board plugin for WordPress is vulnerable to unauthorized access/modification/deletion of data due to use of hardcoded default secrets in the sb_encryption() function in all versions up to, and including, 3.8.0. This makes it possible for unauthenticated attackers to bypass authorization and execute arbitrary AJAX actions defined in the sb_ajax_execute() function. An attacker can use this vulnerability to exploit CVE-2025-4828 and various other functions unauthenticated.

EPSS

Процентиль: 48%
0.00249
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-639