Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-6187 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: The `order_info` REST endpoint in bSecure lacks proper authorization checks.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-862** (Missing Authorization). The flaw lies in the `class-bsecure-checkout.php` file where the REST API endpoint does not verify if the user has the right permissions to access the data. πŸ”

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **bSecure – Your Universal Checkout**. πŸ“… **Version**: **1.7.9 and earlier**. 🏒 **Vendor**: bsecuretech. If you are running an older version, you are at risk!

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With **CVSS 9.8 (Critical)**, attackers can achieve: πŸ”“ **High Confidentiality** breach (read sensitive data), πŸ”“ **High Integrity** breach (modify data), and πŸ”“ **High Availability** impact.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. 🌐 **Network**: Remote (AV:N). πŸ”‘ **Privileges**: None required (PR:N). πŸ–±οΈ **User Interaction**: None (UI:N). 🎯 **Complexity**: Low (AC:L).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

🚫 **Public Exploit**: **No**. The `pocs` field is empty in the provided data. While references exist (WordFence, WordPress Trac), there is no confirmed public Proof-of-Concept (PoC) or widespread wild exploitation yet.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan your WordPress site for the **bSecure** plugin. πŸ“‹ Check the version number. If it is **≀ 1.7.9**, you are vulnerable.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. The vendor (bsecuretech) has acknowledged the issue. πŸ”„ **Action**: Update the plugin to the latest version immediately.…

Q9What if no patch? (Workaround)

πŸ›‘ **No Patch? Workaround**: If you cannot update immediately: 🚫 **Disable** the plugin if not critical. πŸ›‘οΈ **Restrict** access to the `/wp-json/` endpoint via WAF (Web Application Firewall).…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. With a **CVSS 9.8** score and **no auth required**, this is a high-priority vulnerability. πŸƒ **Action**: Patch **IMMEDIATELY**.…