CVE-2025-12676
BaseFortify
Publication date: 2025-11-05
Last updated on: 2025-11-06
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | kiotviet_sync | 1.8.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-259 | The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The KiotViet Sync plugin for WordPress has an authorization bypass vulnerability in all versions up to and including 1.8.5. This occurs because the plugin uses a hardcoded password for authentication in the QueryControllerAdmin::authenticated function, allowing unauthenticated attackers to create and sync products.
How can this vulnerability impact me? :
This vulnerability allows unauthenticated attackers to bypass authorization and create or sync products within the affected WordPress plugin, potentially leading to unauthorized data manipulation or disruption of product data.