The SiteGround Security plugin for WordPress is vulnerable to authentication bypass that allows unauthenticated users to log in as administrative users due to missing identity verification on initial 2FA set-up that allows unauthenticated and unauthorized users to configure 2FA for pending accounts. Upon successful configuration, the attacker is logged in as that user without access to a username/password pair which is the expected first form of authentication. This affects versions up to, and including, 1.2.5.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 05 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-05-05T16:43:36.718Z

Reserved: 2022-03-16T00:00:00.000Z

Link: CVE-2022-0992

cve-icon Vulnrichment

Updated: 2024-08-02T23:47:42.986Z

cve-icon NVD

Status : Modified

Published: 2022-04-19T21:15:13.623

Modified: 2025-05-05T17:17:33.117

Link: CVE-2022-0992

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.