Unauthenticated Attackers Can Bypass Authentication and Access Existing User Accounts
CVE-2024-4393
9.8CRITICAL
Summary
The Social Connect plugin for WordPress is affected by an authentication bypass vulnerability due to inadequate verification of the OpenID server during the social login process. This flaw impacts versions up to and including 1.2, enabling unauthenticated attackers to gain access as any existing user, including those with administrative privileges, provided they have access to the user's email address. This vulnerability poses a significant risk to WordPress sites using this plugin, emphasizing the need for users to update to a secure version promptly.
Affected Version(s)
Social Connect * <= 1.2
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
István Márton