The OAuth Single Sign On WordPress plugin before 6.22.6 doesn't validate that OAuth access token requests are legitimate, which allows attackers to log onto the site with the only knowledge of a user's email address.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de - Exploit, Third Party Advisory |
Information
Published : 2022-07-17 11:15
Updated : 2024-11-21 07:00
NVD link : CVE-2022-2133
Mitre link : CVE-2022-2133
CVE.ORG link : CVE-2022-2133
JSON object : View
Products Affected
miniorange
- oauth_single_sign_on
CWE
CWE-287
Improper Authentication