CVE-2025-13587

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to bypass two-factor authentication on WordPress sites using the affected plugin, enabling them to log in without the second verification step. To exploit this, the attacker simply needs to include any value in the 'token' parameter during the login process, which could even be left empty.

Technical Description

The Two Factor (2FA) Authentication via Email plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 1.9.8. This is because the SS88_2FAVE::wp_login() method only enforces the 2FA requirement if the 'token' HTTP GET parameter is undefined, which makes it possible to bypass two-factor authentication by supplying any value in the 'token' parameter during login, including an empty one.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactHigh
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$931($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 19, 2026

about 2 months ago

Last Modified

Feb 19, 2026

about 2 months ago