cve/2022/CVE-2022-2133.md

18 lines
822 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-2133](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2133)
![](https://img.shields.io/static/v1?label=Product&message=OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=6.22.6%3C%206.22.6%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-287%20Improper%20Authentication&color=brighgreen)
### Description
The OAuth Single Sign On WordPress plugin before 6.22.6 doesn't validate that OAuth access token requests are legitimate, which allows attackers to log onto the site with the only knowledge of a user's email address.
### POC
#### Reference
- https://wpscan.com/vulnerability/e76939ca-180f-4472-a26a-e0c36cfd32de
#### Github
- https://github.com/ARPSyndicate/cvemon