First published: Tue Feb 20 2024(Updated: )
The Login Lockdown – Protect Login Form plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the generate_export_file function in all versions up to, and including, 2.08. This makes it possible for authenticated attackers, with subscriber access and higher, to export this plugin's settings that include whitelisted IP addresses as well as a global unlock key. With the global unlock key an attacker can add their IP address to the whitelist.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Login Lockdown – Protect Login Form | <=2.08 | |
WordPress Login Lockdown – Protect Login Form | <2.09 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1340 has a high severity rating due to the potential for unauthorized access of sensitive data.
To fix CVE-2024-1340, update the Login Lockdown – Protect Login Form plugin to version 2.09 or later.
CVE-2024-1340 affects all installations of the Login Lockdown – Protect Login Form plugin up to and including version 2.08.
CVE-2024-1340 allows authenticated attackers with subscriber access to perform unauthorized data exports.
The primary cause of CVE-2024-1340 is a missing capability check in the generate_export_file function of the plugin.