Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-31380 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Weak password recovery mechanism in 'Paid Videochat Turnkey Site'. πŸ’₯ **Consequences**: Attackers can hijack accounts via password reset abuse. Full system compromise possible due to High CVSS score.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-640** (Improper Control of a Resource Through its Identification). πŸ” **Flaw**: The password reset logic lacks proper validation or rate limiting, allowing unauthorized resets.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin: **Paid Videochat Turnkey Site**. πŸ“‰ **Version**: **7.3.11** and earlier versions. 🏒 **Vendor**: videowhisper.

Q4What can hackers do? (Privileges/Data)

πŸ‘€ **Privileges**: Can impersonate any user. πŸ”“ **Data**: Access to private chats, payments, and admin settings. ⚠️ **Impact**: **C:H / I:H / A:H** (Confidentiality, Integrity, Availability all High).

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. 🌐 **Auth**: **PR:N** (No Privileges Required). πŸ–±οΈ **UI**: **UI:N** (No User Interaction Needed). πŸ“‘ **Network**: **AV:N** (Network Accessible).

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exp?**: No specific PoC code listed in data. πŸ“š **Refs**: Patchstack links confirm vulnerability existence. ⚠️ **Status**: Likely exploitable via manual testing of the reset endpoint.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for 'Paid Videochat Turnkey Site' v7.3.11-. πŸ§ͺ **Test**: Attempt password reset for test accounts. πŸ“Š **Tool**: Use WPScan or Patchstack database to verify version.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ”§ **Fix**: Update plugin to version **> 7.3.11**. πŸ“’ **Source**: Vendor 'videowhisper' should release patched version. πŸ”„ **Action**: Check official WordPress plugin repository for updates.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: Disable public password reset feature. πŸ”’ **Restrict**: Limit access to admin endpoints. πŸ‘€ **Monitor**: Log all password reset requests for anomalies.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. πŸ“ˆ **CVSS**: 9.8 (Critical). ⏳ **Priority**: Patch immediately. No auth required makes it high-risk for automated attacks.