CVE-2024-5149

The BuddyForms plugin for WordPress is vulnerable to Email Verification Bypass in all versions up to, and including, 2.8.9 via the use of an insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification.
Configurations

Configuration 1 (hide)

cpe:2.3:a:themekraft:buddyforms:*:*:*:*:*:wordpress:*:*

History

06 Jun 2024, 14:15

Type Values Removed Values Added
CWE CWE-330
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 5.3
CPE cpe:2.3:a:themekraft:buddyforms:*:*:*:*:*:wordpress:*:*
First Time Themekraft
Themekraft buddyforms
References () https://plugins.trac.wordpress.org/browser/buddyforms/tags/2.8.9/includes/wp-insert-user.php#L334 - () https://plugins.trac.wordpress.org/browser/buddyforms/tags/2.8.9/includes/wp-insert-user.php#L334 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/a5c8d361-698b-4abd-bcdd-0361d3fd10c5?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/a5c8d361-698b-4abd-bcdd-0361d3fd10c5?source=cve - Third Party Advisory

05 Jun 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-05 05:15

Updated : 2024-06-06 14:15


NVD link : CVE-2024-5149

Mitre link : CVE-2024-5149


JSON object : View

Products Affected

themekraft

  • buddyforms
CWE
CWE-330

Use of Insufficiently Random Values