7.3
CVE-2024-6637
- EPSS 0.55%
- Veröffentlicht 20.07.2024 08:15:16
- Zuletzt bearbeitet 11.02.2025 15:43:25
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WooCommerce - Social Login <= 2.7.3 - Unauthenticated Privilege Escalation via One-Time Password
The WooCommerce - Social Login plugin for WordPress is vulnerable to unauthenticated privilege escalation in all versions up to, and including, 2.7.3. This is due to a lack of brute force controls on a weak one-time password. This makes it possible for unauthenticated attackers to brute force the one-time password for any user, except an Administrator, if they know the email of user.
Mögliche Gegenmaßnahme
WooCommerce - Social Login: Update to version 2.7.4, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WooCommerce - Social Login
Version
*-2.7.3
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wpwebelite ≫ Woocommerce Social Login SwPlatformwordpress Version < 2.7.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.55% | 0.669 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 7.3 | 3.9 | 3.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
CWE-305 Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.