Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-10245 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Critical Auth Bypass in Relais 2FA plugin. πŸ“‰ **Consequences**: Attackers can bypass login screens entirely. Full site compromise is imminent. Admin accounts are at risk.…

Q2Root Cause? (CWE/Flaw)

πŸ” **CWE**: CWE-288 (Authentication Bypass). πŸ› **Flaw**: Incorrect logic in `rl_do_ajax` function. ❌ **Root Cause**: Missing or flawed capability checks. ⚠️ **Result**: Security controls are ignored by the server.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: mobisoft974. πŸ“¦ **Product**: Relais 2FA for WordPress. πŸ“… **Affected**: Versions **1.0 and earlier**. βœ… **Safe**: Versions > 1.0 (likely). 🌐 **Platform**: WordPress sites using this specific plugin.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Login as **ANY** user. πŸ›‘οΈ **Target**: Especially **Administrators**. πŸ“§ **Requirement**: Attacker needs victim's email. πŸ’Ύ **Data**: Full access to site content.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. 🚫 **Auth**: **Unauthenticated** attack. πŸ–±οΈ **UI**: No user interaction needed. 🌐 **Network**: Remote exploitation via AJAX. πŸ“Ά **Ease**: Trivial to execute.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Exploit**: **Yes**, Public PoC exists. πŸ”— **Link**: GitHub by RandomRobbieBF. πŸ“ **Method**: POST request to `admin-ajax.php`. 🌍 **Status**: Active exploitation possible. ⚠️ **Risk**: High visibility for attackers.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Check**: Scan for Relais 2FA plugin. πŸ“Š **Version**: Verify version <= 1.0. πŸ› οΈ **Tool**: Use WPScan or manual inspection. πŸ“‚ **File**: Check `relais.php` logic. 🚩 **Flag**: Look for `rl_do_ajax` endpoint.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fix**: Update plugin to **> 1.0**. πŸ”„ **Action**: Immediate upgrade required. πŸ“₯ **Source**: WordPress Plugin Repository. βœ… **Verification**: Check changelog for fix. 🚫 **Note**: Patch addresses `rl_do_ajax` flaw.

Q9What if no patch? (Workaround)

🚫 **Disable**: Deactivate plugin immediately. 🧱 **Block**: Restrict `admin-ajax.php` access. πŸ›‘οΈ **WAF**: Add rule to block exploit payload. πŸ‘€ **Monitor**: Watch for suspicious admin logins.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **CRITICAL**. 🚨 **CVSS**: 9.8 (High). ⏱️ **Urgency**: Patch NOW. πŸ“‰ **Risk**: Active exploitation. πŸƒ **Action**: Immediate remediation needed. πŸ›‘ **Do Not Ignore**: Site is vulnerable.