The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied during the social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-44026 The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied during the social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T20:40:47.142Z

Reserved: 2024-05-01T16:02:35.514Z

Link: CVE-2024-4393

cve-icon Vulnrichment

Updated: 2024-08-01T20:40:47.142Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-08T03:15:07.020

Modified: 2024-11-21T09:42:45.563

Link: CVE-2024-4393

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T23:05:45Z

Weaknesses

No weakness.