{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-10924","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2024-11-06T14:20:37.200Z","datePublished":"2024-11-15T03:18:45.746Z","dateUpdated":"2026-01-23T15:19:28.477Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2024-11-19T13:37:03.351Z"},"affected":[{"vendor":"Really Simple Plugins","product":"Really Simple Security Pro multisite","versions":[{"version":"9.0.0","status":"affected","lessThanOrEqual":"9.1.1.1","versionType":"semver"}],"defaultStatus":"unaffected"},{"vendor":"rogierlankhorst","product":"Really Simple Security – Simple and Performant Security (formerly Really Simple SSL)","versions":[{"version":"9.0.0","status":"affected","lessThanOrEqual":"9.1.1.1","versionType":"semver"}],"defaultStatus":"unaffected"},{"vendor":"Really Simple Plugins","product":"Really Simple Security Pro","versions":[{"version":"9.0.0","status":"affected","lessThanOrEqual":"9.1.1.1","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Really Simple Security (Free, Pro, and Pro Multisite) plugins for WordPress are vulnerable to authentication bypass in versions 9.0.0 to 9.1.1.1. This is due to improper user check error handling in the two-factor REST API actions with the 'check_login_and_get_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, when the \"Two-Factor Authentication\" setting is enabled (disabled by default)."}],"title":"Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 - 9.1.1.1 - Authentication Bypass","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/7d5d05ad-1a7a-43d2-bbbf-597e975446be?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.php#L67"},{"url":"https://plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.php#L277"},{"url":"https://plugins.trac.wordpress.org/browser/really-simple-ssl/tags/9.1.1.1/security/wordpress/two-fa/class-rsssl-two-factor-on-board-api.php#L278"},{"url":"https://plugins.trac.wordpress.org/changeset/3188431/really-simple-ssl"},{"url":"https://www.wordfence.com/blog/2024/11/really-simple-security-vulnerability/"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-288 Authentication Bypass Using an Alternate Path or Channel","cweId":"CWE-288","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"credits":[{"lang":"en","type":"finder","value":"István Márton"}],"timeline":[{"time":"2024-11-06T00:00:00.000Z","lang":"en","value":"Discovered"},{"time":"2024-11-06T00:00:00.000Z","lang":"en","value":"Vendor Notified"},{"time":"2024-11-14T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"affected":[{"vendor":"really-simple-plugins","product":"really_simple_security","cpes":["cpe:2.3:a:really-simple-plugins:really_simple_security:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"9.0.0","status":"affected","lessThanOrEqual":"9.1.1.1","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-15T17:56:32.562044Z","id":"CVE-2024-10924","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-15T17:58:22.917Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-01-23T15:19:28.477Z"},"references":[{"url":"https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}