CVE Vulnerabilities

CVE-2024-9989

Authentication Bypass Using an Alternate Path or Channel

Published: Oct 29, 2024 | Modified: Nov 07, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due a to limited arbitrary method call to crypto_connect_ajax_process::log_in function in the crypto_connect_ajax_process function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

Weakness

A product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

Name Vendor Start Version End Version
Crypto_tool Odude * 2.15 (including)

Potential Mitigations

References