LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-25471

CVE-2026-25471 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: March 19, 2026

Themepaste Admin Safety Guard - Authentication Bypass

Published: March 19, 2026Updated: March 19, 2026Remote Exploitable

Overview

Themepaste Admin Safety Guard <= 1.2.6 contains an authentication bypass caused by alternate path or channel handling in password recovery, letting attackers bypass authentication, exploit requires no special privileges.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 7.4%(Probability of exploitation in next 30 days)

Impact

Attackers can bypass authentication, potentially gaining unauthorized access to the system.

Mitigation

Update to the latest version beyond 1.2.6.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Mar 19, 2026

🟠 CVE-2026-25471 - High (8.1) Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through 1.2.6. šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-25471/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-25471
Severity
High
CVSS Score
8.1
Type
broken_authentication
Status
unconfirmed
EPSS
7.4%
Social Posts
1

CWE

  • CWE-288

CVSS Metrics

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

7.4%Probability of exploitation in the next 30 days