The WP 2FA with Telegram plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0. This is due to insufficient validation of the user-controlled key on the 'validate_tg' action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator.
History

Thu, 17 Oct 2024 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:wordpress:*:*

Tue, 15 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Dueclic
Dueclic wp 2fa With Telegram
CPEs cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:*:*:*
Vendors & Products Dueclic
Dueclic wp 2fa With Telegram
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 02:15:00 +0000

Type Values Removed Values Added
Description The WP 2FA with Telegram plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0. This is due to insufficient validation of the user-controlled key on the 'validate_tg' action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator.
Title WP 2FA with Telegram <= 3.0 - Authenticated (Subscriber+) Authentication Bypass
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-15T02:03:49.768Z

Updated: 2024-10-15T15:49:57.267Z

Reserved: 2024-10-09T13:14:36.188Z

Link: CVE-2024-9687

cve-icon Vulnrichment

Updated: 2024-10-15T15:47:39.871Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-15T02:15:02.920

Modified: 2024-10-17T21:11:14.197

Link: CVE-2024-9687

cve-icon Redhat

No data.