7.3
CVE-2024-6635
- EPSS 0.33%
- Veröffentlicht 20.07.2024 08:15:16
- Zuletzt bearbeitet 11.02.2025 15:39:13
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WooCommerce - Social Login <= 2.7.3 - Unauthenticated Authentication Bypass
The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.3. This is due to insufficient controls in the 'woo_slg_login_email' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, excluding an administrator, if they know the email of user.
Mögliche Gegenmaßnahme
WooCommerce - Social Login: Update to version 2.7.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WooCommerce - Social Login
Version
*-2.7.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpwebelite ≫ Woocommerce Social Login SwPlatformwordpress Version < 2.7.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.33% | 0.553 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 7.3 | 3.9 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.