{"api_version":"1","generated_at":"2026-04-23T13:35:29+00:00","cve":"CVE-2023-2982","urls":{"html":"https://cve.report/CVE-2023-2982","api":"https://cve.report/api/cve/CVE-2023-2982.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2982","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2982"},"summary":{"title":"WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass","description":"The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5.","state":"PUBLISHED","assigner":"Wordfence","published_at":"2023-06-29 02:15:16","updated_at":"2026-04-08 17:16:58"},"problem_types":["CWE-288","CWE-288 CWE-288 Authentication Bypass Using an Alternate Path or Channel"],"metrics":[{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/08ca186a-2486-4a58-9c53-03e9eba13e66?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/08ca186a-2486-4a58-9c53-03e9eba13e66?source=cve","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://plugins.trac.wordpress.org/changeset/2924863/miniorange-login-openid","name":"https://plugins.trac.wordpress.org/changeset/2924863/miniorange-login-openid","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://plugins.trac.wordpress.org/changeset/2925914/miniorange-login-openid","name":"https://plugins.trac.wordpress.org/changeset/2925914/miniorange-login-openid","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://lana.codes/lanavdb/2326f41f-a39f-4fde-8627-9d29fff91443/","name":"https://lana.codes/lanavdb/2326f41f-a39f-4fde-8627-9d29fff91443/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"Social Login and Register by miniOrange WordPess plugin Authentication Bypass – Lana Codes","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://plugins.trac.wordpress.org/browser/miniorange-login-openid/trunk/mo-openid-social-login-functions.php#L107","name":"https://plugins.trac.wordpress.org/browser/miniorange-login-openid/trunk/mo-openid-social-login-functions.php#L107","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"403 Forbidden","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2982","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2982","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"cyberlord92","product":"miniOrange Social Login and Register (Discord, Google, Twitter, LinkedIn)","version":"affected 7.6.4 semver","platforms":[]}],"timeline":[{"source":"CNA","time":"2023-05-28T00:00:00.000Z","lang":"en","value":"Discovered"},{"source":"CNA","time":"2023-05-30T00:00:00.000Z","lang":"en","value":"Vendor Notified"},{"source":"CNA","time":"2023-06-28T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"István Márton","lang":"en"}],"nvd_cpes":[{"cve_year":"2023","cve_id":"2982","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"miniorange","cpe5":"wordpress_social_login_and_register_\\(discord\\,_google\\,_twitter\\,_linkedin\\)","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-2982","qid":"730839","title":"WordPress Plugin Social Login and Register (Discord, Google, Twitter, LinkedIn) Authentication Bypass Vulnerability"}]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-02T06:41:03.909Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/08ca186a-2486-4a58-9c53-03e9eba13e66?source=cve"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/browser/miniorange-login-openid/trunk/mo-openid-social-login-functions.php#L107"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2925914/miniorange-login-openid"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/2924863/miniorange-login-openid"},{"tags":["x_transferred"],"url":"https://lana.codes/lanavdb/2326f41f-a39f-4fde-8627-9d29fff91443/"}],"title":"CVE Program Container"},{"metrics":[{"other":{"content":{"id":"CVE-2023-2982","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-11-27T16:18:20.310071Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-11-27T16:18:29.073Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"miniOrange Social Login and Register (Discord, Google, Twitter, LinkedIn)","vendor":"cyberlord92","versions":[{"lessThanOrEqual":"7.6.4","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"István Márton"}],"descriptions":[{"lang":"en","value":"The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5."}],"metrics":[{"cvssV3_1":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-288","description":"CWE-288 Authentication Bypass Using an Alternate Path or Channel","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T16:34:20.273Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/08ca186a-2486-4a58-9c53-03e9eba13e66?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/miniorange-login-openid/trunk/mo-openid-social-login-functions.php#L107"},{"url":"https://plugins.trac.wordpress.org/changeset/2925914/miniorange-login-openid"},{"url":"https://plugins.trac.wordpress.org/changeset/2924863/miniorange-login-openid"},{"url":"https://lana.codes/lanavdb/2326f41f-a39f-4fde-8627-9d29fff91443/"}],"timeline":[{"lang":"en","time":"2023-05-28T00:00:00.000Z","value":"Discovered"},{"lang":"en","time":"2023-05-30T00:00:00.000Z","value":"Vendor Notified"},{"lang":"en","time":"2023-06-28T00:00:00.000Z","value":"Disclosed"}],"title":"WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2023-2982","datePublished":"2023-06-29T01:56:56.207Z","dateReserved":"2023-05-30T13:38:43.774Z","dateUpdated":"2026-04-08T16:34:20.273Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2023-06-29 02:15:16","lastModifiedDate":"2026-04-08 17:16:58","problem_types":["CWE-288","CWE-288 CWE-288 Authentication Bypass Using an Alternate Path or Channel"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:miniorange:wordpress_social_login_and_register_\\(discord\\,_google\\,_twitter\\,_linkedin\\):*:*:*:*:*:wordpress:*:*","versionEndExcluding":"7.6.5","matchCriteriaId":"4942FAAF-310A-4B97-AE0F-109F09B21257"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2023","CveId":"2982","Ordinal":"1","Title":"WordPress Social Login and Register (Discord, Google, Twitter, L","CVE":"CVE-2023-2982","Year":"2023"},"notes":[{"CveYear":"2023","CveId":"2982","Ordinal":"1","NoteData":"The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5.","Type":"Description","Title":"WordPress Social Login and Register (Discord, Google, Twitter, L"}]}}}