Description
The Keyy Two Factor Authentication (like Clef) plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.2.3. This is due to the plugin not properly validating a user's identity associated with a token generated. This makes it possible for authenticated attackers, with subscriber-level access and above, to generate valid auth tokens and leverage that to auto-login as other accounts, including administrators, as long as the administrator has the 2FA set up.
Published: 2025-10-15
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Account Takeover
Action: Patch Now
AI Analysis

Impact

The vulnerability exists in the Keyy Two Factor Authentication (like Clef) plugin for WordPress, versions up to 1.2.3. The flaw arises because the plugin fails to validate the identity associated with tokens it generates. As a result, any authenticated user with at least subscriber level can fabricate a valid authentication token and use it to bypass two‑factor authentication, effectively logging in as another account, including administrators if they have 2FA enabled. This enables privilege escalation, allowing attackers to compromise the site’s integrity and confidentiality (CWE‑287).

Affected Systems

The flaw affects WordPress sites that have the Keyy Two Factor Authentication (like Clef) plugin installed at version 1.2.3 or earlier. The vulnerability is confined to the plugin itself; it requires an active WordPress installation with the plugin enabled. All users with subscriber or higher privileges are potentially capable of exploiting it if the system has no additional protections.

Risk and Exploitability

The Common Vulnerability Scoring System rates this issue at 8.8, classifying it as high severity. EPSS indicates a very low exploitation probability (<1%) at the moment, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. The attack vector is authenticated; an attacker must first obtain valid credentials with subscriber‑level access. Once inside, they can generate forged tokens through the plugin’s token‑generation endpoint and instantly hijack any target account that has two‑factor authentication activated, resulting in immediate privilege escalation across the site.

Generated by OpenCVE AI on April 22, 2026 at 22:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Keyy Two Factor Authentication (like Clef) plugin to version 1.2.4 or later
  • If the update is not available, remove or deactivate the plugin to eliminate the flaw
  • Implement stricter role‑based access control, ensuring that only essential users can generate authentication tokens, and consider requiring additional verification before allowing token creation or use

Generated by OpenCVE AI on April 22, 2026 at 22:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Nexist
Nexist keyy Two Factor Authentication
Wordpress
Wordpress wordpress
Vendors & Products Nexist
Nexist keyy Two Factor Authentication
Wordpress
Wordpress wordpress

Wed, 15 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Keyy Two Factor Authentication (like Clef) plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.2.3. This is due to the plugin not properly validating a user's identity associated with a token generated. This makes it possible for authenticated attackers, with subscriber-level access and above, to generate valid auth tokens and leverage that to auto-login as other accounts, including administrators, as long as the administrator has the 2FA set up.
Title Keyy Two Factor Authentication (like Clef) <= 1.2.3 - Authenticated (Subscriber+) Privilege Escalation via Account Takeover
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Nexist Keyy Two Factor Authentication
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:37:36.636Z

Reserved: 2025-09-11T19:45:14.095Z

Link: CVE-2025-10293

cve-icon Vulnrichment

Updated: 2025-10-15T15:28:28.291Z

cve-icon NVD

Status : Deferred

Published: 2025-10-15T09:15:38.850

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10293

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T22:15:26Z

Weaknesses