The SiteGround Security plugin for WordPress is vulnerable to authentication bypass that allows unauthenticated users to log in as administrative users due to missing identity verification on initial 2FA set-up that allows unauthenticated and unauthorized users to configure 2FA for pending accounts. Upon successful configuration, the attacker is logged in as that user without access to a username/password pair which is the expected first form of authentication. This affects versions up to, and including, 1.2.5.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.wordfence.com/blog/2022/04/critical-authentication-bypass-vulnerability-patched-in-siteground-security-plugin/ | Exploit Third Party Advisory | 
| https://plugins.trac.wordpress.org/changeset/2706302 | Release Notes Vendor Advisory | 
Configurations
                    Information
                Published : 2022-04-19 14:15
Updated : 2022-04-27 09:13
NVD link : CVE-2022-0992
Mitre link : CVE-2022-0992
JSON object : View
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
Products Affected
                siteground
- siteground_security
 


