The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).
Metrics
Affected Vendors & Products
References
History
Wed, 20 Nov 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 | |
CPEs | cpe:2.3:a:really-simple-plugins:really_simple_security:*:*:*:*:-:wordpress:*:* cpe:2.3:a:really-simple-plugins:really_simple_security:*:*:*:*:pro:wordpress:*:* cpe:2.3:a:really-simple-plugins:really_simple_security:*:*:*:*:pro_multisite:wordpress:*:* |
Tue, 19 Nov 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 15 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Really-simple-plugins
Really-simple-plugins really Simple Security |
|
CPEs | cpe:2.3:a:really-simple-plugins:really_simple_security:*:*:*:*:*:*:*:* | |
Vendors & Products |
Really-simple-plugins
Really-simple-plugins really Simple Security |
|
Metrics |
ssvc
|
Fri, 15 Nov 2024 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default). | |
Title | Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass | |
Weaknesses | CWE-288 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-15T03:18:45.746Z
Updated: 2024-11-19T13:37:03.351Z
Reserved: 2024-11-06T14:20:37.200Z
Link: CVE-2024-10924
Vulnrichment
Updated: 2024-11-15T17:58:18.691Z
NVD
Status : Analyzed
Published: 2024-11-15T04:15:03.613
Modified: 2024-11-20T14:44:47.350
Link: CVE-2024-10924
Redhat
No data.