Dear [Company Security Team/IT Team],
I hope this email finds you well. My name is Trilok Dhaked, and I am a cybersecurity researcher. While conducting security research, I discovered a potential vulnerability affecting [Company’s Website/Application]. I would like to responsibly disclose this issue to help improve the security of your platform.
Hi team
The vulnerability enables attackers to bypass authentication mechanisms and gain unauthorized access to privileged accounts, posing significant risks to the confidentiality, integrity, and availability of the affected systems.
Technical Details
- Vulnerability Type: Authentication Bypass
- Affected Component:
crypto_connect_
functionajax_process::log_in - Root Cause: Arbitrary method call within the
crypto_connect_ajax_
functionprocess - Attack Vector: Network
- Severity: Critical
Proof of Concept : unlisted video https://youtu.be/ MvYX5Fzi6l0
Impact:
- Unauthorized access to administrative accounts.
- Compromise of sensitive data.
- Deployment of malicious content or malware.
- Disruption of website functionality or availability.
Recommendations
Immediate Actions
- Update the Crypto Plugin:
- Upgrade to the latest version of the Crypto plugin that addresses this vulnerability.
- Verify compatibility with your WordPress installation before updating
- Require 2FA for all privileged accounts to strengthen security.
Fix Them
I am sharing my PayPal ID with you.
Vulnerability severity | Bug bounty reward amount (in |
---|---|
P1 (Critical) | $5000 |
P2 (High) | $2500 |
P3 (Medium) | $1000 |
P4 (Low) | $500 |
I hope this will be fixed soon. Feel free to let me know if you have any other questions.
I believe addressing this issue promptly will help protect your users and infrastructure. Please let me know the best way to report further details securely. I am happy to collaborate to ensure proper mitigation.
Looking forward to your response.
Best Regards,
Trilok Dhaked
Ethical Hacker
Email: [email protected]
LinkedIn: https://www.linkedin.com/in/trilokdhaked