• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Critical Security Flaw in Social Login Plugin for WordPress Exposes Users’ Accounts

You are here: Home / Cyber Security News / Critical Security Flaw in Social Login Plugin for WordPress Exposes Users’ Accounts

A critical security flaw has been disclosed in miniOrange’s Social Login and Register plugin for WordPress that could permit a destructive actor to log in as any person-furnished data about email handle is previously recognised.

Tracked as CVE-2023-2982 (CVSS score: 9.8), the authentication bypass flaw impacts all variations of the plugin, including and prior to 7.6.4. It was resolved on June 14, 2023, with the release of variation 7.6.5 next dependable disclosure on June 2, 2023.

“The vulnerability can make it attainable for an unauthenticated attacker to achieve access to any account on a web-site together with accounts utilized to administer the site, if the attacker appreciates, or can locate, the related email deal with,” Wordfence researcher István Márton mentioned.

The issue is rooted in the reality that the encryption essential applied to safe the info all through login working with social media accounts is really hard-coded, so leading to a state of affairs exactly where attackers could develop a legitimate ask for with a appropriately encrypted email handle used to identify the consumer.

Need to the account belong to the WordPress web page administrator, it could consequence in a total compromise. The plugin is used on a lot more than 30,000 websites.

The advisory follows the discovery of a large-severity flaw impacting LearnDash LMS plugin, a WordPress plugin with in excess of 100,000 active installations, that could permit any user with an present account to reset arbitrary person passwords, which include all those with administrator accessibility.

The bug (CVE-2023-3105, CVSS score: 8.8), has been patched in edition 4.6..1 that was delivered on June 6, 2023.

It also arrives weeks soon after Patchstack in depth a cross-website ask for forgery (CSRF) vulnerability in the UpdraftPlus plugin (CVE-2023-32960, CVSS score: 7.1) that could allow an unauthenticated attacker to steal delicate info and elevate privileges by tricking a user with administrative permissions to stop by a crafted WordPress web site URL.

Identified this posting appealing? Observe us on Twitter  and LinkedIn to read extra distinctive information we write-up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: «AllTech.News Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data
Next Post: Android Spy App LetMeSpy Suffers Major Data Breach, Exposing Users’ Personal Data »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency
  • Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
  • ASUS Patches DriverHub RCE Flaws Exploitable via HTTP and Crafted .ini Files
  • ⚡ Weekly Recap: Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams
  • The Persistence Problem: Why Exposed Credentials Remain Unfixed—and How to Change That

Copyright © 2025 · AllTech.News, All Rights Reserved.