CVE-2024-9988 – Crypto <= 2.15 - Authentication Bypass via register
https://notcve.org/view.php?id=CVE-2024-9988
28 Oct 2024 — The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due to missing validation on the user being supplied in the 'crypto_connect_ajax_process::register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. El complemento Crypto para WordPress es vulnerable a la omisión de autenticación en versiones hasta la 2.15 incluida. Esto ... • https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L91 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •
CVE-2024-9990 – Crypto <= 2.15 - Cross-Site Request Forgery to Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-9990
28 Oct 2024 — The Crypto plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.15. This is due to missing nonce validation in the 'crypto_connect_ajax_process::check' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. El complemento Crypto para WordPress es vulnerable a Cross-Si... • https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L31 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2024-9989 – Crypto <= 2.15 - Authentication Bypass via log_in
https://notcve.org/view.php?id=CVE-2024-9989
28 Oct 2024 — The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due a to limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. El complemento Crypto para WordPress es vulnerable a la omisión de autenticación en versiones has... • https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L138 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •