vulnerability
WordPress Plugin: wordable: CVE-2020-36724: Authentication Bypass Using an Alternate Path or Channel
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | Jan 28, 2020 | May 15, 2025 | Apr 30, 2026 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
Jan 28, 2020
Added
May 15, 2025
Modified
Apr 30, 2026
Description
The Wordable plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.1. This is due to the use of a user supplied hashing algorithm passed to the hash_hmac() function and the use of a loose comparison on the hash which allows an attacker to trick the function into thinking it has a valid hash. This makes it possible for unauthenticated attackers to gain administrator privileges.
Solution
wordable-plugin-cve-2020-36724
References
- https://www.cve.org/CVERecord?id=CVE-2020-36724
- https://www.wordfence.com/threat-intel/vulnerabilities/id/be1ab218-37bd-407a-8cb9-66f761849c21?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2020-24166
- CVE-2020-36724
- https://attackerkb.com/topics/CVE-2020-36724
- CWE-288
- CWE-306
- EUVD-EUVD-2020-24166
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.