The User Verification WordPress plugin before 1.0.94 was affected by an Auth Bypass security vulnerability. To bypass authentication, we only need to know the user’s username. Depending on whose username we know, which can be easily queried because it is usually public data, we may even be given an administrative role on the website.
References
Link | Resource |
---|---|
https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea | Exploit Third Party Advisory |
https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957 - Exploit, Third Party Advisory | |
References | () https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea - Exploit, Third Party Advisory |
23 Jun 2023, 16:11
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-522 |
Information
Published : 2023-01-23 15:15
Updated : 2024-11-21 07:35
NVD link : CVE-2022-4693
Mitre link : CVE-2022-4693
CVE.ORG link : CVE-2022-4693
JSON object : View
Products Affected
pickplugins
- user_verification
CWE
CWE-522
Insufficiently Protected Credentials