First published: Mon Feb 12 2024(Updated: )
The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions 'handle_auth_request' and 'hadle_login_request'. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.
Credit: contact@wpscan.com
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.