CVE Vulnerabilities

CVE-2024-10924

Authentication Bypass Using an Alternate Path or Channel

Published: Nov 15, 2024 | Modified: Nov 20, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the check_login_and_get_user function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the Two-Factor Authentication setting is enabled (disabled by default).

Weakness

A product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

Name Vendor Start Version End Version
Really_simple_security Really-simple-plugins 9.0.0 (including) 9.1.2 (excluding)

Potential Mitigations

References