The WP Users Masquerade plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.0. This is due to incorrect authentication and capability checking in the 'ajax_masq_login' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 | |
CPEs | cpe:2.3:a:lagunaisw:wp_users_masquerade:*:*:*:*:*:wordpress:*:* |
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lagunaisw
Lagunaisw wp Users Masquerade |
|
CPEs | cpe:2.3:a:lagunaisw:wp_users_masquerade:*:*:*:*:*:*:*:* | |
Vendors & Products |
Lagunaisw
Lagunaisw wp Users Masquerade |
|
Metrics |
ssvc
|
Thu, 10 Oct 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP Users Masquerade plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.0. This is due to incorrect authentication and capability checking in the 'ajax_masq_login' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator. | |
Title | WP Users Masquerade <= 2.0.0 - Authentication Bypass | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-10T02:06:06.456Z
Updated: 2024-10-10T17:47:02.026Z
Reserved: 2024-10-04T12:12:14.456Z
Link: CVE-2024-9522
Vulnrichment
Updated: 2024-10-10T17:46:56.542Z
NVD
Status : Analyzed
Published: 2024-10-10T02:15:06.013
Modified: 2024-10-15T14:27:41.553
Link: CVE-2024-9522
Redhat
No data.