Impact
The Admin Safety Guard plugin for WordPress contains an authentication bypass that uses an alternate path, allowing an attacker to exploit the password‑recovery mechanism. The flaw enables the replacement of a user’s password without providing the current password, thereby granting unauthorized access. This is classified as a CWE‑288 weakness, which directly undermines the integrity of user credentials.
Affected Systems
Affected installations include any version of the Admin Safety Guard plugin from Themepaste dated 1.2.6 or earlier. No versions newer than 1.2.6 are listed as affected.
Risk and Exploitability
The EPSS score for this vulnerability is below 1 % and it does not appear in CISA’s KEV catalog, indicating a low likelihood of widespread exploitation. The likely attack path involves requesting a password‑reset link, capturing or obtaining the reset token, and then using it to set a new password. This path is inferred from the description; the exact method of token acquisition is not detailed in the source. If an attacker can intercept or guess the reset link, account takeover is possible.
OpenCVE Enrichment