The SiteGround Security plugin for WordPress is vulnerable to authentication bypass that allows unauthenticated users to log in as administrative users due to missing identity verification on initial 2FA set-up that allows unauthenticated and unauthorized users to configure 2FA for pending accounts. Upon successful configuration, the attacker is logged in as that user without access to a username/password pair which is the expected first form of authentication. This affects versions up to, and including, 1.2.5.
References
Link | Resource |
---|---|
https://www.wordfence.com/blog/2022/04/critical-authentication-bypass-vulnerability-patched-in-siteground-security-plugin/ | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2706302 | Release Notes Vendor Advisory |
Configurations
Information
Published : 2022-04-19 14:15
Updated : 2022-04-27 09:13
NVD link : CVE-2022-0992
Mitre link : CVE-2022-0992
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
siteground
- siteground_security