Description

The Comments – wpDiscuz plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.6.24. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.

INFO

Published Date :

2024-10-25T05:35:29.077Z

Last Modified :

2026-04-08T17:17:36.786Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2024-9488 vulnerability.

Vendors Products
Gvectors
  • Wpdiscuz

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact