The SiteGround Security plugin for WordPress is vulnerable to authentication bypass that allows unauthenticated users to log in as administrative users due to missing identity verification on initial 2FA set-up that allows unauthenticated and unauthorized users to configure 2FA for pending accounts. Upon successful configuration, the attacker is logged in as that user without access to a username/password pair which is the expected first form of authentication. This affects versions up to, and including, 1.2.5.
History

Mon, 05 May 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2022-04-19T20:26:33.000Z

Updated: 2025-05-05T16:43:36.718Z

Reserved: 2022-03-16T00:00:00.000Z

Link: CVE-2022-0992

cve-icon Vulnrichment

Updated: 2024-08-02T23:47:42.986Z

cve-icon NVD

Status : Modified

Published: 2022-04-19T21:15:13.623

Modified: 2025-05-05T17:17:33.117

Link: CVE-2022-0992

cve-icon Redhat

No data.