The WP 2FA with Telegram plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0. This is due to insufficient validation of the user-controlled key on the 'validate_tg' action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Oct 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:wordpress:*:* |
Tue, 15 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dueclic
Dueclic wp 2fa With Telegram |
|
CPEs | cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:*:*:* | |
Vendors & Products |
Dueclic
Dueclic wp 2fa With Telegram |
|
Metrics |
ssvc
|
Tue, 15 Oct 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP 2FA with Telegram plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0. This is due to insufficient validation of the user-controlled key on the 'validate_tg' action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator. | |
Title | WP 2FA with Telegram <= 3.0 - Authenticated (Subscriber+) Authentication Bypass | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-15T02:03:49.768Z
Updated: 2024-10-15T15:49:57.267Z
Reserved: 2024-10-09T13:14:36.188Z
Link: CVE-2024-9687
Vulnrichment
Updated: 2024-10-15T15:47:39.871Z
NVD
Status : Analyzed
Published: 2024-10-15T02:15:02.920
Modified: 2024-10-17T21:11:14.197
Link: CVE-2024-9687
Redhat
No data.