CVE Vulnerabilities

CVE-2024-9988

Authentication Bypass Using an Alternate Path or Channel

Published: Oct 29, 2024 | Modified: Nov 07, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due to missing validation on the user being supplied in the crypto_connect_ajax_process::register function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

Weakness

A product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

Name Vendor Start Version End Version
Crypto_tool Odude * 2.15 (including)

Potential Mitigations

References