vulnerability
WordPress Plugin: two-factor-login-telegram: CVE-2024-9820: Reliance on Cookies without Validation and Integrity Checking in a Security Decision
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:L/Au:S/C:N/I:C/A:N) | Oct 14, 2024 | May 15, 2025 | May 15, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:C/A:N)
Published
Oct 14, 2024
Added
May 15, 2025
Modified
May 15, 2025
Description
The WP 2FA with Telegram plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 3.0. This is due to the two-factor code being stored in a cookie, which makes it possible to bypass two-factor authentication.
Solution
two-factor-login-telegram-plugin-cve-2024-9820

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.