CVE-2024-4186

The Edwiser Bridge plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.0.5. This is due to the 'eb_user_email_verification_key' default value is empty, and the not empty check is missing in the 'eb_user_email_verify' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This can only be exploited if the 'Email Verification' setting is enabled.
Configurations

No configuration.

History

08 Apr 2026, 18:21

Type Values Removed Values Added
CWE CWE-288
Summary (en) The Build App Online plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.0.5. This is due to the 'eb_user_email_verification_key' default value is empty, and the not empty check is missing in the 'eb_user_email_verify' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This can only be exploited if the 'Email Verification' setting is enabled. (en) The Edwiser Bridge plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.0.5. This is due to the 'eb_user_email_verification_key' default value is empty, and the not empty check is missing in the 'eb_user_email_verify' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This can only be exploited if the 'Email Verification' setting is enabled.

21 Nov 2024, 09:42

Type Values Removed Values Added
Summary
  • (es) El complemento Build App Online para WordPress es vulnerable a la omisión de autenticación en versiones hasta la 3.0.5 incluida. Esto se debe a que el valor predeterminado 'eb_user_email_verification_key' está vacío y falta la marca de verificación no vacía en la función 'eb_user_email_verify'. Esto hace posible que atacantes no autenticados inicien sesión como cualquier usuario existente en el sitio, como un administrador, si tienen acceso a la identificación del usuario. Esto sólo se puede explotar si la configuración 'Verificación de correo electrónico' está habilitada.
References () https://plugins.trac.wordpress.org/browser/edwiser-bridge/tags/3.0.4/includes/class-eb-user-manager.php#L1571 - () https://plugins.trac.wordpress.org/browser/edwiser-bridge/tags/3.0.4/includes/class-eb-user-manager.php#L1571 -
References () https://plugins.trac.wordpress.org/changeset/3081961/edwiser-bridge#file1 - () https://plugins.trac.wordpress.org/changeset/3081961/edwiser-bridge#file1 -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/6969d281-f280-4714-9859-38ac66e9cc60?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/6969d281-f280-4714-9859-38ac66e9cc60?source=cve -

07 May 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-07 06:15

Updated : 2026-04-15 00:35


NVD link : CVE-2024-4186

Mitre link : CVE-2024-4186

CVE.ORG link : CVE-2024-4186


JSON object : View

Products Affected

No product.

CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel