Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-4606 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Unauthenticated Privilege Escalation in WordPress Theme 'Sala'. πŸ’₯ **Consequences**: Attackers can hijack ANY account (even Admins) via password reset. Total site takeover possible. πŸ“‰

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-620**: Unverified Password Reset Token. πŸ” **Flaw**: The `change_password_ajax` endpoint lacks identity verification.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: Sala - Startup & SaaS WordPress Theme. 🏒 **Vendor**: uxper. πŸ“… **Affected**: Versions **<= 1.1.4**. If you are on 1.1.4 or older, you are at risk! ⚠️

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Full Admin Access. πŸ”“ **Data**: Complete Account Takeover. Hackers can reset passwords for **arbitrary users**, including Super Admins. No password needed to initiate the reset. πŸ’€

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold: LOW**. πŸ”‘ **Auth**: None required (Unauthenticated). βš™οΈ **Config**: Direct AJAX endpoint exposure. Easy to trigger via simple HTTP requests. πŸš€

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Yes, Public PoCs Exist**. πŸ‘€ **GitHub**: Multiple exploits available (e.g., Yucaerin, UcenHaxor07). 🌐 **Wild Exploitation**: High risk. Automated scanners likely already targeting this. πŸ•·οΈ

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Look for `wp_ajax_nopriv_change_password_ajax` in theme code. πŸ“‘ **Scan**: Use WPScan or manual AJAX fuzzing on `/wp-admin/admin-ajax.php`. πŸ§ͺ **Test**: Try resetting a password without being logged in.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Update to version **> 1.1.4** immediately. πŸ“’ **Official**: Check vendor 'uxper' for the patched release. Do not ignore updates! πŸ“₯

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the `change_password_ajax` function via code snippet. πŸ›‘ **Mitigation**: Block access to `admin-ajax.php` for non-authenticated users if possible.…

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Priority: CRITICAL**. ⏰ **Urgency**: Immediate action required. CVSS Score: **9.8** (High). Zero-day style impact. Patch NOW or risk total compromise. πŸƒβ€β™‚οΈπŸ’¨