The WP 2FA with Telegram plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0. This is due to insufficient validation of the user-controlled key on the 'validate_tg' action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 17 Oct 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:wordpress:*:* |
Tue, 15 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dueclic
Dueclic wp 2fa With Telegram |
|
| CPEs | cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Dueclic
Dueclic wp 2fa With Telegram |
|
| Metrics |
ssvc
|
Tue, 15 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP 2FA with Telegram plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0. This is due to insufficient validation of the user-controlled key on the 'validate_tg' action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator. | |
| Title | WP 2FA with Telegram <= 3.0 - Authenticated (Subscriber+) Authentication Bypass | |
| Weaknesses | CWE-639 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-15T02:03:49.768Z
Updated: 2024-10-15T15:49:57.267Z
Reserved: 2024-10-09T13:14:36.188Z
Link: CVE-2024-9687
Updated: 2024-10-15T15:47:39.871Z
Status : Analyzed
Published: 2024-10-15T02:15:02.920
Modified: 2024-10-17T21:11:14.197
Link: CVE-2024-9687
No data.