CVE-2022-4693

The User Verification WordPress plugin before 1.0.94 was affected by an Auth Bypass security vulnerability. To bypass authentication, we only need to know the user’s username. Depending on whose username we know, which can be easily queried because it is usually public data, we may even be given an administrative role on the website.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pickplugins:user_verification:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
Summary
  • (es) El complemento User Verification de WordPress anterior a la versión 1.0.94 se vio afectado por una vulnerabilidad de seguridad de Auth Bypass. Para evitar la autenticación, sólo necesitamos saber el nombre de usuario del usuario. Dependiendo de qué nombre de usuario conozcamos, que se puede consultar fácilmente porque normalmente son datos públicos, es posible que incluso se nos asigne una función administrativa en el sitio web.
References () https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957 - Exploit, Third Party Advisory () https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957 - Exploit, Third Party Advisory
References () https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea - Exploit, Third Party Advisory

23 Jun 2023, 16:11

Type Values Removed Values Added
CWE CWE-287 CWE-522

Information

Published : 2023-01-23 15:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4693

Mitre link : CVE-2022-4693

CVE.ORG link : CVE-2022-4693


JSON object : View

Products Affected

pickplugins

  • user_verification
CWE
CWE-522

Insufficiently Protected Credentials