{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-2891","assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","dateUpdated":"2024-08-03T00:53:00.501Z","dateReserved":"2022-08-18T00:00:00.000Z","datePublished":"2022-10-10T00:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan","dateUpdated":"2023-07-24T09:59:20.811Z"},"title":"WP 2FA < 2.3.0 - Time-Based Side-Channel Attack","problemTypes":[{"descriptions":[{"description":"CWE-203 Observable Discrepancy","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"Unknown","product":"WP 2FA","versions":[{"status":"affected","versionType":"custom","version":"0","lessThan":"2.3.0"}],"defaultStatus":"unaffected","collectionURL":"https://wordpress.org/plugins"}],"descriptions":[{"lang":"en","value":"The WP 2FA WordPress plugin before 2.3.0 uses comparison operators that don't mitigate time-based attacks, which could be abused to leak information about the authentication codes being compared."}],"references":[{"url":"https://wpscan.com/vulnerability/301b3dce-2584-46ec-92ed-1c0626522120","tags":["exploit","vdb-entry","technical-description"]}],"credits":[{"lang":"en","value":"Calvin Alkan","type":"finder"},{"lang":"en","value":"WPScan","type":"coordinator"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"WPScan CVE Generator"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T00:53:00.501Z"},"title":"CVE Program Container","references":[{"url":"https://wpscan.com/vulnerability/301b3dce-2584-46ec-92ed-1c0626522120","tags":["exploit","vdb-entry","technical-description","x_transferred"]}]}]}}