The Social Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.9.0. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.
                
            References
                    Configurations
                    No configuration.
History
                    06 Dec 2024, 01:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | 
 | 
23 Nov 2024, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-23 04:15
Updated : 2024-12-06 01:15
NVD link : CVE-2024-10961
Mitre link : CVE-2024-10961
CVE.ORG link : CVE-2024-10961
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-288
                        
            Authentication Bypass Using an Alternate Path or Channel
