Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7wgv-8jv9-78p4

Опубликовано: 13 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.

The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.

EPSS

Процентиль: 62%
0.00422
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-565

Связанные уязвимости

CVSS3: 9.8
nvd
около 2 месяцев назад

The JAY Login & Register plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.01. This is due to incorrect authentication checking in the 'jay_login_register_process_switch_back' function with the 'jay_login_register_process_switch_back' cookie value. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.

EPSS

Процентиль: 62%
0.00422
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-565