CVE-2026-25471
Received Received - Intake
Authentication Bypass in Themepaste Admin Safety Guard

Publication date: 2026-03-19

Last updated on: 2026-04-28

Assigner: Patchstack

Description
Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard admin-safety-guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through <= 1.2.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-19
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-03-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
patchstack admin_safety_guard to 1.2.6 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-25471 is a Broken Authentication vulnerability in the WordPress Admin Safety Guard Plugin versions up to 1.2.6. It allows unauthenticated attackers to bypass authentication mechanisms by exploiting an alternate path or channel, enabling them to perform actions normally restricted to administrators.

This vulnerability falls under the OWASP Top 10 category A7: Identification and Authentication Failures, meaning it compromises the authentication process and can lead to unauthorized access.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows attackers to gain administrative access to the affected WordPress site without authentication.

  • Attackers can escalate privileges and take control of the website.
  • They may perform unauthorized actions such as modifying content, stealing sensitive data, or installing malicious code.
  • The vulnerability has a high CVSS score of 8.1, indicating a high risk of exploitation and significant potential damage.

No official patch is currently available, increasing the urgency to apply mitigations or updates once released.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

The WordPress Admin Safety Guard Plugin versions up to 1.2.6 are affected by a high-priority Broken Authentication vulnerability (CVE-2026-25471) that allows unauthenticated attackers to gain administrative access.

No official patch is currently available for this vulnerability.

Patchstack has issued a mitigation rule that can block attacks exploiting this flaw until a safe and tested official patch is released.

Users are strongly advised to update the plugin immediately once a patch becomes available.

Alternatively, seek assistance from your hosting provider or web developer to apply the mitigation rule or other protective measures.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart