The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default). | |
Title | Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass | |
Weaknesses | CWE-288 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-15T03:18:45.746Z
Updated: 2024-11-15T03:18:45.746Z
Reserved: 2024-11-06T14:20:37.200Z
Link: CVE-2024-10924
Vulnrichment
No data.
NVD
Status : Awaiting Analysis
Published: 2024-11-15T04:15:03.613
Modified: 2024-11-15T13:58:08.913
Link: CVE-2024-10924
Redhat
No data.