8.8
CVE-2024-50488
- EPSS 26.49%
- Veröffentlicht 28.10.2024 13:15:06
- Zuletzt bearbeitet 01.04.2026 16:19:11
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Token Login <= 1.0.3 - Authenticated (Subscriber+) Privilege Escalation
Authentication Bypass Using an Alternate Path or Channel vulnerability in yespbs Token Login token-login allows Authentication Bypass.This issue affects Token Login: from n/a through <= 1.0.3.
Mögliche Gegenmaßnahme
Auto Login using a secure tokenized url. Role wise login restriction.: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Auto Login using a secure tokenized url. Role wise login restriction.
Version
*-1.0.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Priyabratasarkar ≫ Token Login SwPlatformwordpress Version <= 1.0.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 26.49% | 0.963 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.