Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-50478 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical authentication bypass in the '1-Click Login: Passwordless Authentication' plugin.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-305** (Authentication Bypass). The plugin fails to properly verify the user's identity before granting access. It trusts the login request without sufficient proof of ownership.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin: **1-Click Login: Passwordless Authentication**. πŸ“Œ **Version**: Specifically **v1.4.5**. 🏒 **Vendor**: Swoop. 🌐 **Platform**: WordPress sites using this specific plugin.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Hackers Can**: Bypass login entirely. πŸ‘€ **Privileges**: Access any account, including **Administrators**. πŸ“‚ **Data**: Full read/write access to site content, user data, and configuration. Total control.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. 🌐 **Network**: Remote (AV:N). πŸ”‘ **Auth**: None required (PR:N). πŸ–±οΈ **UI**: None required (UI:N). 🎯 **Requirement**: Just need to know the victim's **email address** to trigger the bypass.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Exploit**: **YES**. Public PoC available on GitHub (RandomRobbieBF). πŸ“ **Description**: 'Authentication Bypass via Account Takeover'. 🌍 **Status**: Active exploitation risk due to simplicity.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Check WordPress Plugins list for '1-Click Login: Passwordless Authentication'. 2. Verify version is **1.4.5**. 3. Look for email-based login features. 4. Scan for CVE-2024-50478 signatures.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Update the plugin to the latest patched version immediately. πŸ“’ **Official**: Patch is implied by the CVE publication. Check vendor (Swoop) or WordPress repo for updates.…

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1. **Disable** the plugin immediately. 2. Revert to standard username/password login. 3. Monitor admin logs for suspicious login attempts. 4. Reset passwords for all users as a precaution.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL** (CVSS 9.8). 🚨 **Priority**: Patch **IMMEDIATELY**. This is a remote, unauthenticated vulnerability with full system impact. Do not wait. πŸ›‘ High risk of immediate compromise.