Description
Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard admin-safety-guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through <= 1.2.7.
Published: 2026-03-19
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch Now
AI Analysis

Impact

The Admin Safety Guard plugin for WordPress contains an authentication bypass that uses an alternate path, allowing an attacker to exploit the password‑recovery mechanism. The flaw enables the replacement of a user’s password without providing the current password, thereby granting unauthorized access. This is classified as a CWE‑288 weakness, which directly undermines the integrity of user credentials.

Affected Systems

Affected installations include any version of the Admin Safety Guard plugin from Themepaste dated 1.2.6 or earlier. No versions newer than 1.2.6 are listed as affected.

Risk and Exploitability

The EPSS score for this vulnerability is below 1 % and it does not appear in CISA’s KEV catalog, indicating a low likelihood of widespread exploitation. The likely attack path involves requesting a password‑reset link, capturing or obtaining the reset token, and then using it to set a new password. This path is inferred from the description; the exact method of token acquisition is not detailed in the source. If an attacker can intercept or guess the reset link, account takeover is possible.

Generated by OpenCVE AI on April 2, 2026 at 05:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Admin Safety Guard plugin to a version newer than 1.2.6.
  • If an update cannot be applied immediately, disable or remove the plugin to eliminate the vulnerable functionality.
  • Limit password‑reset attempts or add a CAPTCHA to the reset form to reduce the risk of abuse.
  • Configure password‑reset tokens to expire quickly and bind them strictly to the intended user account.

Generated by OpenCVE AI on April 2, 2026 at 05:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard admin-safety-guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through <= 1.2.6. Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard admin-safety-guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through <= 1.2.7.
Title WordPress Admin Safety Guard plugin <= 1.2.6 - Broken Authentication vulnerability WordPress Admin Safety Guard plugin <= 1.2.7 - Broken Authentication vulnerability
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through 1.2.6. Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard admin-safety-guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through <= 1.2.6.
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 19 Mar 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Themepaste
Themepaste admin Safety Guard
Wordpress
Wordpress wordpress
Vendors & Products Themepaste
Themepaste admin Safety Guard
Wordpress
Wordpress wordpress

Thu, 19 Mar 2026 07:30:00 +0000

Type Values Removed Values Added
Description Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through 1.2.6.
Title WordPress Admin Safety Guard plugin <= 1.2.6 - Broken Authentication vulnerability
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Themepaste Admin Safety Guard
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-23T14:14:09.971Z

Reserved: 2026-02-02T12:53:59.642Z

Link: CVE-2026-25471

cve-icon Vulnrichment

Updated: 2026-03-19T13:45:12.604Z

cve-icon NVD

Status : Deferred

Published: 2026-03-19T08:16:19.140

Modified: 2026-04-23T15:37:13.023

Link: CVE-2026-25471

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:59:58Z

Weaknesses