First published: Tue Oct 15 2024(Updated: )
The WP 2FA with Telegram plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0. This is due to insufficient validation of the user-controlled key on the 'validate_tg' action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dueclic Wp 2fa With Telegram Wordpress | <3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.