The Sign In With Google plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.8.0. This is due to the 'authenticate_user' user function not implementing sufficient null value checks when setting the access token and user information. This makes it possible for unauthenticated attackers to log in as the first user who has signed in using Google OAuth, which could be the site administrator.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 12 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Dec 2024 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Sign In With Google plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.8.0. This is due to the 'authenticate_user' user function not implementing sufficient null value checks when setting the access token and user information. This makes it possible for unauthenticated attackers to log in as the first user who has signed in using Google OAuth, which could be the site administrator. | |
Title | Sign In With Google <= 1.8.0 - Authentication Bypass in authenticate_user | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-12-12T16:27:37.738Z
Reserved: 2024-11-08T03:24:32.104Z
Link: CVE-2024-11015

Updated: 2024-12-12T16:26:39.277Z

Status : Received
Published: 2024-12-12T04:15:04.797
Modified: 2024-12-12T04:15:04.797
Link: CVE-2024-11015

No data.

Updated: 2025-07-12T22:44:42Z