{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T14:27:24.205","vulnerabilities":[{"cve":{"id":"CVE-2024-5150","sourceIdentifier":"security@wordfence.com","published":"2024-05-29T02:16:32.303","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Login with phone number plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.26. This is due to the 'activation_code' default value is empty, and the not empty check is missing in the 'lwp_ajax_register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user email. The vulnerability is patched in version 1.7.26, but there is an issue in the patch that causes the entire function to not work, and this issue is fixed in version 1.7.27."},{"lang":"es","value":"El complemento The Login with phone number para WordPress es vulnerable a la omisión de autenticación en versiones hasta la 1.7.26 incluida. Esto se debe a que el valor predeterminado 'activation_code' está vacío y falta la verificación de no vacío en la función 'lwp_ajax_register'. Esto hace posible que atacantes no autenticados inicien sesión como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al correo electrónico del usuario. La vulnerabilidad se parcheó en la versión 1.7.26, pero hay un problema en el parche que hace que toda la función no funcione, y este problema se solucionó en la versión 1.7.27."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-288"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4183","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4220","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4241","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset/3090625/login-with-phone-number","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/changeset/3090754/login-with-phone-number#file5","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/cf34eb9f-f6e9-4a7a-8459-c86f9fa3dad8?source=cve","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4183","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4220","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.7.25/login-with-phonenumber.php#L4241","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://plugins.trac.wordpress.org/changeset/3090625/login-with-phone-number","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://plugins.trac.wordpress.org/changeset/3090754/login-with-phone-number#file5","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/cf34eb9f-f6e9-4a7a-8459-c86f9fa3dad8?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}