### [CVE-2024-9822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9822) ![](https://img.shields.io/static/v1?label=Product&message=Pedalo%20Connector&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%3C%3D%202.0.5%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&color=brighgreen) ### Description The Pedalo Connector plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.0.5. This is due to insufficient restriction on the 'login_admin_user' function. This makes it possible for unauthenticated attackers to log to the first user, who is usually the administrator, or if it does not exist, then to the first administrator. ### POC #### Reference No PoCs from references. #### Github - https://github.com/RandomRobbieBF/CVE-2024-9822