CVE-2024-10924
WordPress vulnerability analysis and mitigation

Overview

The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress contain an authentication bypass vulnerability (CVE-2024-10924) affecting versions 9.0.0 to 9.1.1.1. The vulnerability was discovered and reported by István Márton from Wordfence on November 6, 2024, and was publicly disclosed on November 14, 2024 (Wordfence Blog).

Technical details

The vulnerability stems from improper user check error handling in the two-factor REST API actions with the 'checkloginandgetuser' function. The issue has received a CVSS v3.1 score of 9.8 (Critical), with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function) and CWE-288 (Authentication Bypass Using an Alternate Path or Channel) (NVD).

Impact

When exploited, this vulnerability allows unauthenticated attackers to log in as any existing user on the site, including administrators, when the 'Two-Factor Authentication' setting is enabled. While the two-factor authentication feature is disabled by default, sites that have enabled it are at risk of complete compromise (Wordfence Blog).

Mitigation and workarounds

Site administrators running affected versions should immediately update to version 9.1.2 or later, which contains the security fix. The vulnerability was patched in the WordPress plugin repository (WordPress Plugin).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management