
CVE-2024-54294 – WordPress Firebase OTP Authentication plugin <= 1.0.1 - Account Takeover vulnerability
https://notcve.org/view.php?id=CVE-2024-54294
11 Dec 2024 — Authentication Bypass Using an Alternate Path or Channel vulnerability in appgenixinfotech Firebase OTP Authentication allows Authentication Bypass.This issue affects Firebase OTP Authentication: from n/a through 1.0.1. The Firebase OTP Authentication plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.1. This makes it possible for unauthenticated attackers to elevate their privilege level and gain access to administrator accounts. • https://patchstack.com/database/wordpress/plugin/authentication-via-otp-using-firebase/vulnerability/wordpress-firebase-otp-authentication-plugin-1-0-1-account-takeover-vulnerability?_s_id=cve • CWE-288: Authentication Bypass Using an Alternate Path or Channel CWE-862: Missing Authorization •

CVE-2024-11023 – Session Hijacking in Firebase JavaScript SDK
https://notcve.org/view.php?id=CVE-2024-11023
18 Nov 2024 — Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cookie to store configuration data, including an "_authTokenSyncURL" field used for session synchronization. If this cookie field is preset via an attacker by any other method, the attacker can manipulate the "_authTokenSyncURL" to point to their own server and it would allow am actor to capture user session data transmitted by the SDK. We recommend upgrading Firebase JS SDK at least to 10.9.0. Firebase JavaScript SDK utilizes a "FIREBASE_DEFAULTS" cook... • https://firebase.google.com/support/release-notes/js#version_1090_-_march_14_2024 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-4128 – CSRF in firebase-tools emulator suite
https://notcve.org/view.php?id=CVE-2024-4128
02 May 2024 — This vulnerability was a potential CSRF attack. When running the Firebase emulator suite, there is an export endpoint that is used normally to export data from running emulators. If a user was running the emulator and navigated to a malicious website with the exploit on a browser that allowed calls to localhost (ie Chrome before v94), the website could exfiltrate emulator data. We recommend upgrading past version 13.6.0 or commit 068a2b08dc308c7ab4b569617f5fc8821237e3a0 https://github.com/firebase/firebase-... • https://github.com/firebase/firebase-tools/commit/068a2b08dc308c7ab4b569617f5fc8821237e3a0 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2018-1000025
https://notcve.org/view.php?id=CVE-2018-1000025
09 Feb 2018 — Jerome Gamez Firebase Admin SDK for PHP version from 3.2.0 to 3.8.0 contains a Incorrect Access Control vulnerability in src/Firebase/Auth/IdTokenVerifier.php does not verify for token signature that can result in JWT with any email address and user ID could be forged from an actual token, or from thin air. This attack appear to be exploitable via Attacker would only need to know email address of the victim on most cases.. This vulnerability appears to have been fixed in 3.8.1. Jerome Gamez Firebase Admin S... • https://github.com/kreait/firebase-php/pull/151 • CWE-732: Incorrect Permission Assignment for Critical Resource •