Unauthenticated Attackers Can Log in as Any Existing User on the Site
CVE-2024-5432
9.8CRITICAL
Key Information:
- Vendor
- Webinnane
- Status
- Lifeline Donation
- Vendor
- CVE Published:
- 20 June 2024
Summary
The Lifeline Donation plugin for WordPress is susceptible to an authentication bypass issue due to inadequate user verification during the checkout process. This vulnerability allows unauthenticated attackers to gain access as any existing user on the WordPress site, including users with administrative privileges, provided they know the email associated with the account. It highlights a significant security risk as it can lead to unauthorized actions on the site, potentially compromising sensitive user data and overall site integrity.
Affected Version(s)
Lifeline Donation * <= 1.2.6
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
István Márton