CVE Vulnerabilities

CVE-2024-9989

Authentication Bypass Using an Alternate Path or Channel

Published: Oct 29, 2024 | Modified: Nov 07, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due a to limited arbitrary method call to crypto_connect_ajax_process::log_in function in the crypto_connect_ajax_process function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

NameVendorStart VersionEnd Version
Crypto_toolOdude*2.15 (including)

Potential Mitigations

References