Логотип exploitDog
bind:CVE-2024-10924
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-10924

Количество 3

Количество 3

nvd логотип

CVE-2024-10924

около 1 года назад

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-f75h-cwp9-8h5x

около 1 года назад

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2024-09749

больше 1 года назад

Уязвимость плагинов Really Simple Security Free, Really Simple Security Pro и Really Simple Security Pro Multisite системы управления содержимым сайта WordPress, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-10924

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).

CVSS3: 9.8
94%
Критический
около 1 года назад
github логотип
GHSA-f75h-cwp9-8h5x

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the "Two-Factor Authentication" setting is enabled (disabled by default).

CVSS3: 9.8
94%
Критический
около 1 года назад
fstec логотип
BDU:2024-09749

Уязвимость плагинов Really Simple Security Free, Really Simple Security Pro и Really Simple Security Pro Multisite системы управления содержимым сайта WordPress, позволяющая нарушителю повысить свои привилегии

CVSS3: 9.8
94%
Критический
больше 1 года назад

Уязвимостей на страницу