Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mobisoft974
Mobisoft974 relais 2fa |
|
| CPEs | cpe:2.3:a:mobisoft974:relais_2fa:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Mobisoft974
Mobisoft974 relais 2fa |
|
| Metrics |
ssvc
|
Tue, 12 Nov 2024 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Relais 2FA plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0. This is due to incorrect authentication and capability checking in the 'rl_do_ajax' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. | |
| Title | Relais 2FA <= 1.0 - Authentication Bypass | |
| Weaknesses | CWE-288 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-11-12T14:59:19.721Z
Reserved: 2024-10-22T10:59:02.310Z
Link: CVE-2024-10245
Updated: 2024-11-12T14:59:11.038Z
Status : Awaiting Analysis
Published: 2024-11-12T10:15:04.003
Modified: 2024-11-12T13:55:21.227
Link: CVE-2024-10245
No data.
OpenCVE Enrichment
No data.