Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-prv7-jrrf-hwvc

Опубликовано: 10 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The Elated Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.2. This is due to the plugin not properly logging in a user with the data that was previously verified through the 'eltdf_membership_check_facebook_user' and the 'eltdf_membership_login_user_from_social_network' function. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.

The Elated Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.2. This is due to the plugin not properly logging in a user with the data that was previously verified through the 'eltdf_membership_check_facebook_user' and the 'eltdf_membership_login_user_from_social_network' function. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.

EPSS

Процентиль: 62%
0.00422
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-289

Связанные уязвимости

CVSS3: 9.8
nvd
2 месяца назад

The Elated Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.2. This is due to the plugin not properly logging in a user with the data that was previously verified through the 'eltdf_membership_check_facebook_user' and the 'eltdf_membership_login_user_from_social_network' function. This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site which can easily be created by default through the temp user functionality, and access to the administrative user's email.

EPSS

Процентиль: 62%
0.00422
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-289