The Login Me Now plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.2. This is due to insecure authentication based on an arbitrary transient name in the 'AutoLogin::listen()' function. This makes it possible for unauthenticated attackers to log in an existing user on the site, even an administrator. Note: this vulnerability requires using a transient name and value from another software, so the plugin is not inherently vulnerable on it's own.
References
Configurations
History
11 Mar 2025, 16:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pluginly:login_me_now:*:*:*:*:*:wordpress:*:* | |
First Time |
Pluginly
Pluginly login Me Now |
|
CWE | CWE-306 | |
Summary |
|
|
References | () https://plugins.trac.wordpress.org/browser/login-me-now/tags/1.7.2/app/Logins/BrowserTokenLogin/AutoLogin.php#L24 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/fc689622-50d6-47c4-a5f6-0314b1a207c9?source=cve - Third Party Advisory |
27 Feb 2025, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-27 08:15
Updated : 2025-03-11 16:12
NVD link : CVE-2025-1717
Mitre link : CVE-2025-1717
CVE.ORG link : CVE-2025-1717
JSON object : View
Products Affected
pluginly
- login_me_now