Vulnerability identifier: #VU24678
Vulnerability risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-254
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
WPS Hide Login
Web applications /
Modules and components for CMS
Vendor: Rémy Perona
Description
The vulnerability allows a remote attacker to find and access the secret login page.
The vulnerability exists in the "plugins_loaded" function due to some REQUEST_URI occurrences aren’t decoded using the "rawurldecode" function. A remote attack can encode substrings in the URL in order to evade the detection and gain access to the hidden login page.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
WPS Hide Login: 1.1 - 1.5.4.2
External links
https://wpvulndb.com/vulnerabilities/10046/
https://blog.nintechnet.com/wordpress-wps-hide-login-fixed-security-issue/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.