This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical authentication bypass in the '1-Click Login: Passwordless Authentication' plugin.β¦
π‘οΈ **Root Cause**: **CWE-305** (Authentication Bypass). The plugin fails to properly verify the user's identity before granting access. It trusts the login request without sufficient proof of ownership.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: WordPress Plugin: **1-Click Login: Passwordless Authentication**. π **Version**: Specifically **v1.4.5**. π’ **Vendor**: Swoop. π **Platform**: WordPress sites using this specific plugin.
Q4What can hackers do? (Privileges/Data)
π **Hackers Can**: Bypass login entirely. π€ **Privileges**: Access any account, including **Administrators**. π **Data**: Full read/write access to site content, user data, and configuration. Total control.
Q5Is exploitation threshold high? (Auth/Config)
β‘ **Threshold**: **LOW**. π **Network**: Remote (AV:N). π **Auth**: None required (PR:N). π±οΈ **UI**: None required (UI:N). π― **Requirement**: Just need to know the victim's **email address** to trigger the bypass.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π **Exploit**: **YES**. Public PoC available on GitHub (RandomRobbieBF). π **Description**: 'Authentication Bypass via Account Takeover'. π **Status**: Active exploitation risk due to simplicity.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: 1. Check WordPress Plugins list for '1-Click Login: Passwordless Authentication'. 2. Verify version is **1.4.5**. 3. Look for email-based login features. 4. Scan for CVE-2024-50478 signatures.
π§ **No Patch?**: 1. **Disable** the plugin immediately. 2. Revert to standard username/password login. 3. Monitor admin logs for suspicious login attempts. 4. Reset passwords for all users as a precaution.
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL** (CVSS 9.8). π¨ **Priority**: Patch **IMMEDIATELY**. This is a remote, unauthenticated vulnerability with full system impact. Do not wait. π High risk of immediate compromise.