CVE Vulnerabilities

CVE-2024-10924

Authentication Bypass Using an Alternate Path or Channel

Published: Nov 15, 2024 | Modified: Jan 23, 2026
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the check_login_and_get_user function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the Two-Factor Authentication setting is enabled (disabled by default).

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

NameVendorStart VersionEnd Version
Really_simple_securityReally-simple-plugins9.0.0 (including)9.1.2 (excluding)

Potential Mitigations

References