CVE-2025-30777: WordPress Support Genix <= 1.4.11 - Insecure Direct Object References (IDOR) Vulnerability

4.3 CVSS

Description

Authorization Bypass Through User-Controlled Key vulnerability in PalsCode Support Genix allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Support Genix: from n/a through 1.4.11.

Classification

CVE ID: CVE-2025-30777

CVSS Base Severity: MEDIUM

CVSS Base Score: 4.3

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Problem Types

CWE-639 Authorization Bypass Through User-Controlled Key

Affected Products

Vendor: PalsCode

Product: Support Genix

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 6.8% (scored less or equal to compared to others)

EPSS Date: 2025-04-22 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-30777
https://patchstack.com/database/wordpress/plugin/support-genix-lite/vulnerability/wordpress-support-genix-1-4-11-insecure-direct-object-references-idor-vulnerability?_s_id=cve

Timeline