7.3

CVE-2024-6635

WooCommerce - Social Login <= 2.7.3 - Unauthenticated Authentication Bypass

The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.3. This is due to insufficient controls in the 'woo_slg_login_email' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, excluding an administrator, if they know the email of user.
Mögliche Gegenmaßnahme
WooCommerce - Social Login: Update to version 2.7.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt WooCommerce - Social Login
Version *-2.7.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WpwebeliteWoocommerce Social Login SwPlatformwordpress Version < 2.7.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.33% 0.553
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security@wordfence.com 7.3 3.9 3.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
CWE-288 Authentication Bypass Using an Alternate Path or Channel

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

CWE-306 Missing Authentication for Critical Function

The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.