CVE-2024-9820

The WP 2FA with Telegram plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 3.0. This is due to the two-factor code being stored in a cookie, which makes it possible to bypass two-factor authentication.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:wordpress:*:*

History

19 Oct 2024, 00:44

Type Values Removed Values Added
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/ccd73030-7185-4302-b3fd-29cbbe716e3e?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/ccd73030-7185-4302-b3fd-29cbbe716e3e?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/browser/two-factor-login-telegram/tags/3.0/includes/class-wp-factor-telegram-plugin.php#L228 - () https://plugins.trac.wordpress.org/browser/two-factor-login-telegram/tags/3.0/includes/class-wp-factor-telegram-plugin.php#L228 - Product
First Time Dueclic
Dueclic wp 2fa With Telegram
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:wordpress:*:*
CWE CWE-784 CWE-565

15 Oct 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-15 02:15

Updated : 2024-10-19 00:44


NVD link : CVE-2024-9820

Mitre link : CVE-2024-9820


JSON object : View

Products Affected

dueclic

  • wp_2fa_with_telegram
CWE
CWE-565

Reliance on Cookies without Validation and Integrity Checking