Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-13615 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical flaw in **StreamTube Core** allows unauthorized access to user-controlled objects. πŸ“‰ **Consequences**: Leads to **arbitrary password changes** and full **account takeover**.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-639** (Authorization Bypass). πŸ› **Flaw**: Insecure direct object references or improper access control on user objects. πŸ”“ Allows bypassing security checks.

Q3Who is affected? (Versions/Components)

🎯 **Affected**: WordPress Plugin **StreamTube Core**. πŸ“… **Version**: **4.78 and earlier**. 🏒 **Vendor**: phpface. ⚠️ Any site running this version is at risk.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hacker Actions**: Change **any user's password**. πŸ‘‘ **Privilege**: Gain **Account Takeover**. πŸ“‚ **Data**: Full access to user accounts. πŸ”“ No authentication required to exploit.

Q5Is exploitation threshold high? (Auth/Config)

πŸ“Š **Threshold**: **LOW**. 🚫 **Auth**: None required (PR:N). πŸ–±οΈ **UI**: None required (UI:N). 🌐 **Network**: Remote (AV:N). πŸš€ Easy to exploit for anyone.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp?**: **No PoC** listed in data. πŸ•΅οΈ **Wild Exp**: Unknown status. ⚠️ Despite no public code, the CVSS score suggests high exploitability potential.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **StreamTube Core** plugin. πŸ“‹ **Version**: Check if version ≀ **4.78**. πŸ› οΈ **Tool**: Use WP scanners or check `wp-content/plugins` directory. πŸ‘€ Look for unauthorized password reset endpoints.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update to **version 4.79+** (implied). πŸ”„ **Mitigation**: Disable plugin if update unavailable. πŸ“’ **Official**: Vendor **phpface** should release patch. πŸ›‘οΈ Check vendor site for latest version.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: **Disable** the plugin immediately. 🚫 **Block**: Restrict access to plugin endpoints via WAF. πŸ”„ **Manual**: Monitor user accounts for suspicious password changes. πŸ›‘ Limit user registration if possible.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P1**. ⚑ **Reason**: Remote, unauthenticated, high impact (Account Takeover). πŸƒ **Action**: Patch **IMMEDIATELY**. Don't wait for PoC.