Authentication Bypass in AdForest Theme - WordPress
CVE-2024-12857

9.8CRITICAL

Key Information:

Vendor
Wordpress
Status
Vendor
CVE Published:
22 January 2025

What is CVE-2024-12857?

CVE-2024-12857 is a vulnerability found in the AdForest theme for WordPress, developed by Scriptsbundle. This flaw allows unauthenticated attackers to bypass authentication measures resulting in unauthorized access to any user account configured with one-time password (OTP) login via phone number. Such a vulnerability could significantly compromise an organization’s security, as it enables attackers to impersonate legitimate users, potentially leading to unauthorized actions on behalf of those users.

Technical Details

The vulnerability exists in all versions of the AdForest theme up to and including version 5.1.8. Due to improper verification of a user's identity during the login process, an attacker can exploit this flaw to authenticate as a legitimate user without needing valid credentials. The issue highlights critical shortcomings in the theme’s authentication mechanisms, which cannot adequately secure user accounts against unauthorized access.

Potential Impact of CVE-2024-12857

  1. Unauthorized Access to User Accounts: Attackers can gain access to any user account, compromising sensitive information and allowing for actions that could disrupt operations or lead to data breaches.

  2. Impersonation and Fraud: Successful exploitation of this vulnerability enables attackers to impersonate users, potentially leading to fraudulent transactions or the execution of malicious activities under the guise of legitimate users.

  3. Loss of User Trust: The ability for attackers to bypass authentication reduces trust in the security of the platform, which can negatively affect client relationships and the overall reputation of the organization using the vulnerable theme.

Affected Version(s)

AdForest * <= 5.1.8

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Chloe Chamberland
.