The WP Users Masquerade plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.0. This is due to incorrect authentication and capability checking in the 'ajax_masq_login' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 | |
CPEs | cpe:2.3:a:lagunaisw:wp_users_masquerade:*:*:*:*:*:wordpress:*:* |
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Lagunaisw
Lagunaisw wp Users Masquerade |
|
CPEs | cpe:2.3:a:lagunaisw:wp_users_masquerade:*:*:*:*:*:*:*:* | |
Vendors & Products |
Lagunaisw
Lagunaisw wp Users Masquerade |
|
Metrics |
ssvc
|
Thu, 10 Oct 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP Users Masquerade plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.0. This is due to incorrect authentication and capability checking in the 'ajax_masq_login' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator. | |
Title | WP Users Masquerade <= 2.0.0 - Authentication Bypass | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-10T17:47:02.026Z
Reserved: 2024-10-04T12:12:14.456Z
Link: CVE-2024-9522

Updated: 2024-10-10T17:46:56.542Z

Status : Analyzed
Published: 2024-10-10T02:15:06.013
Modified: 2024-10-15T14:27:41.553
Link: CVE-2024-9522

No data.