The Lock User Account plugin for WordPress is vulnerable to user lock bypass in all versions up to, and including, 1.0.5. This is due to permitting application password logins when user accounts are locked. This makes it possible for authenticated attackers, with existing application passwords, to interact with the vulnerable site via an API such as XML-RPC or REST despite their account being locked.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Nov 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Lock User Account plugin for WordPress is vulnerable to user lock bypass in all versions up to, and including, 1.0.5. This is due to permitting application password logins when user accounts are locked. This makes it possible for authenticated attackers, with existing application passwords, to interact with the vulnerable site via an API such as XML-RPC or REST despite their account being locked. | |
Title | Lock User Account <= 1.0.5 - User Lock Bypass | |
Weaknesses | CWE-693 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-21T02:06:34.525Z
Updated: 2024-11-21T11:40:11.462Z
Reserved: 2024-11-13T20:46:00.400Z
Link: CVE-2024-11197
Vulnrichment
Updated: 2024-11-21T11:34:56.928Z
NVD
Status : Awaiting Analysis
Published: 2024-11-21T11:15:24.060
Modified: 2024-11-21T13:57:24.187
Link: CVE-2024-11197
Redhat
No data.