### [CVE-2024-13688](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13688) ![](https://img.shields.io/static/v1?label=Product&message=Admin%20and%20Site%20Enhancements%20(ASE)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-259%20Use%20of%20Hard-coded%20Password&color=brightgreen) ### Description The Admin and Site Enhancements (ASE) WordPress plugin before 7.6.10 uses a hardcoded password in its Password Protection feature, allowing attacker to bypass the protection offered via a crafted request ### POC #### Reference - https://wpscan.com/vulnerability/19051d08-16b0-466c-976b-be7b076e8e92/ #### Github No PoCs found on GitHub currently.