CVE-2024-10114 – Social Login - WordPress / WooCommerce Plugin <= 2.7.7 - Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-10114
The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.7.7. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token. • https://www.wordfence.com/threat-intel/vulnerabilities/id/71df23bf-8f51-4260-be1f-ed5bc29d4afe?source=cve https://www.wpwebelite.com/changelogs/woocommerce-social-login/changelog.txt • CWE-287: Improper Authentication •
CVE-2024-7503 – WooCommerce - Social Login <= 2.7.5 - Authentication Bypass to Account Takeover
https://notcve.org/view.php?id=CVE-2024-7503
The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.5. This is due to the use of loose comparison of the activation code in the 'woo_slg_confirm_email_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the userID. This requires the email module to be enabled. • https://codecanyon.net/item/social-login-wordpress-woocommerce-plugin https://www.wordfence.com/threat-intel/vulnerabilities/id/f3b727ba-b39c-4a98-a6a6-ea33785079f6?source=cve • CWE-288: Authentication Bypass Using an Alternate Path or Channel •
CVE-2024-6637 – WooCommerce - Social Login <= 2.7.3 - Unauthenticated Privilege Escalation via One-Time Password
https://notcve.org/view.php?id=CVE-2024-6637
The WooCommerce - Social Login plugin for WordPress is vulnerable to unauthenticated privilege escalation in all versions up to, and including, 2.7.3. This is due to a lack of brute force controls on a weak one-time password. This makes it possible for unauthenticated attackers to brute force the one-time password for any user, except an Administrator, if they know the email of user. El complemento WooCommerce - Social Login para WordPress es vulnerable a una escalada de privilegios no autenticados en todas las versiones hasta la 2.7.3 incluida. Esto se debe a la falta de controles de fuerza bruta sobre una contraseña de un solo uso débil. • https://codecanyon.net/item/social-login-wordpress-woocommerce-plugin/8495883 https://www.wordfence.com/threat-intel/vulnerabilities/id/10d92d5e-1c23-4f6a-bfab-0756876190a5?source=cve • CWE-305: Authentication Bypass by Primary Weakness •
CVE-2024-6635 – WooCommerce - Social Login <= 2.7.3 - Unauthenticated Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-6635
The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.3. This is due to insufficient controls in the 'woo_slg_login_email' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, excluding an administrator, if they know the email of user. El complemento WooCommerce - Social Login para WordPress es vulnerable a la omisión de autenticación en versiones hasta la 2.7.3 incluida. Esto se debe a controles insuficientes en la función 'woo_slg_login_email'. • https://codecanyon.net/item/social-login-wordpress-woocommerce-plugin/8495883 https://www.wordfence.com/threat-intel/vulnerabilities/id/37836722-eb25-4393-8cdf-91057642ba3f?source=cve • CWE-288: Authentication Bypass Using an Alternate Path or Channel •
CVE-2024-6636 – WooCommerce - Social Login <= 2.7.3 - Missing Authorization to Unauthenticated Privilege Escalation
https://notcve.org/view.php?id=CVE-2024-6636
The WooCommerce - Social Login plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'woo_slg_login_email' function in all versions up to, and including, 2.7.3. This makes it possible for unauthenticated attackers to change the default role to Administrator while registering for an account. El complemento WooCommerce - Social Login para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificación de capacidad en la función 'woo_slg_login_email' en todas las versiones hasta la 2.7.3 incluida. Esto hace posible que atacantes no autenticados cambien la función predeterminada a Administrador mientras se registran para obtener una cuenta. • https://codecanyon.net/item/social-login-wordpress-woocommerce-plugin/8495883 https://www.wordfence.com/threat-intel/vulnerabilities/id/77ea4ba8-6c13-494a-92e3-12643003635b?source=cve • CWE-862: Missing Authorization •