The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied during the social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-44026 | The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied during the social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T20:40:47.142Z
Reserved: 2024-05-01T16:02:35.514Z
Link: CVE-2024-4393
Updated: 2024-08-01T20:40:47.142Z
Status : Awaiting Analysis
Published: 2024-05-08T03:15:07.020
Modified: 2024-11-21T09:42:45.563
Link: CVE-2024-4393
No data.
OpenCVE Enrichment
Updated: 2025-07-12T23:05:45Z
Weaknesses
No weakness.
EUVD