Unauthorized Data Access in Login Lockdown Plugin for WordPress
CVE-2024-1340

5.4MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
29 February 2024

What is CVE-2024-1340?

The Login Lockdown plugin for WordPress is susceptible to unauthorized data access due to a missing capability check in the generate_export_file function. This vulnerability affects all versions up to and including 2.08, allowing authenticated attackers with subscriber or higher roles to export sensitive plugin settings, including whitelisted IP addresses and a global unlock key. With the unlock key, attackers can manipulate the whitelist to potentially gain further access.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Login Lockdown – Protect Login Form * <= 2.08

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lucio SΓ‘
.