Authorization Bypass Through User-Controlled Key vulnerability in PalsCode Support Genix allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Support Genix: from n/a through 1.4.11.
Fixes

Solution

Update the WordPress Support Genix plugin to the latest available version (at least 1.4.12).


Workaround

No workaround given by the vendor.

History

Thu, 27 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 11:00:00 +0000

Type Values Removed Values Added
Description Authorization Bypass Through User-Controlled Key vulnerability in PalsCode Support Genix allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Support Genix: from n/a through 1.4.11.
Title WordPress Support Genix <= 1.4.11 - Insecure Direct Object References (IDOR) Vulnerability
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2025-03-27T18:56:35.247Z

Reserved: 2025-03-26T09:20:01.831Z

Link: CVE-2025-30777

cve-icon Vulnrichment

Updated: 2025-03-27T13:59:46.884Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-27T11:15:38.930

Modified: 2025-03-27T16:45:27.850

Link: CVE-2025-30777

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.