Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Update the WordPress Tuturn Plugin to the latest available version (at least 3.6).
Workaround
No workaround given by the vendor.
Tue, 20 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 19 Dec 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Thu, 18 Dec 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Authentication Bypass Using an Alternate Path or Channel vulnerability in AmentoTech Tuturn allows Authentication Abuse.This issue affects Tuturn: from n/a before 3.6. | |
| Title | WordPress Tuturn plugin < 3.6 - Broken Authentication vulnerability | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-01-20T14:28:19.967Z
Reserved: 2025-10-29T03:08:07.245Z
Link: CVE-2025-64236
Updated: 2025-12-18T16:43:35.298Z
Status : Awaiting Analysis
Published: 2025-12-18T17:15:55.477
Modified: 2026-01-20T15:18:47.247
Link: CVE-2025-64236
No data.
OpenCVE Enrichment
Updated: 2025-12-19T09:15:58Z