CVE-2025-54336
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-08-26
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| plesk | plesk_obsidian | 18.0.71 |
| plesk | plesk_obsidian | 18.0.70 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-697 | The product compares two entities in a security-relevant context, but the comparison is incorrect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
In Plesk Obsidian 18.0.70, the function _isAdminPasswordValid uses an == comparison that causes a type juggling vulnerability. If the correct admin password starts with "0e" followed by digits, an attacker can bypass authentication by providing any other string that evaluates to 0.0 (like "0e0"), allowing unauthorized login.
How can this vulnerability impact me? :
This vulnerability allows an attacker to bypass admin authentication without knowing the actual password, potentially gaining full administrative access. This can lead to complete compromise of the system, including unauthorized data access, modification, and disruption of services.