CVE-2025-13587
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to bypass two-factor authentication on WordPress sites using the affected plugin, enabling them to log in without the second verification step. To exploit this, the attacker simply needs to include any value in the 'token' parameter during the login process, which could even be left empty.
Technical Description
The Two Factor (2FA) Authentication via Email plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 1.9.8. This is because the SS88_2FAVE::wp_login() method only enforces the 2FA requirement if the 'token' HTTP GET parameter is undefined, which makes it possible to bypass two-factor authentication by supplying any value in the 'token' parameter during login, including an empty one.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 19, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago