The WPS Hide Login WordPress plugin before 1.9.1 has a bug which allows to get the secret login page by setting a random referer string and making a request to /wp-admin/options.php as an unauthenticated user.
Published 2021-12-06 16:15:08
Updated 2022-03-17 19:07:18
Source WPScan
View at NVD,   CVE.org

Products affected by CVE-2021-24917

Exploit prediction scoring system (EPSS) score for CVE-2021-24917

2.38%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2021-24917

  • WordPress WPS Hide Login Login Page Revealer
    Disclosure Date: 2021-10-27
    First seen: 2022-12-23
    auxiliary/scanner/http/wp_wps_hide_login_revealer
    This module exploits a bypass issue with WPS Hide Login version <= 1.9. WPS Hide Login is used to make a new secret path to the login page, however a 'GET' request to '/wp-admin/options.php' with a referer will reveal the hidden path. Authors: - thalakus

CVSS scores for CVE-2021-24917

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
5.0
MEDIUM AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
NIST
7.5
HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
3.9
3.6
NIST

CWE ids for CVE-2021-24917

  • The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
    Assigned by:
    • contact@wpscan.com (Secondary)
    • nvd@nist.gov (Primary)

References for CVE-2021-24917

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!