CVE-2024-10961

9.8 CRITICAL

📋 TL;DR

The Social Login WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any existing user, including administrators, if they know the user's email address and the user doesn't have an existing account with the social service. This affects all versions up to and including 5.9.0. Any WordPress site using this plugin is vulnerable.

💻 Affected Systems

Products:
  • Social Login WordPress plugin
Versions: All versions up to and including 5.9.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires the plugin to be installed and active. Attackers need target user email addresses and the user must not have an existing account with the social service.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to WordPress sites, enabling complete site takeover, data theft, malware injection, and defacement.

🟠

Likely Case

Attackers compromise user accounts to steal sensitive data, post malicious content, or escalate privileges to administrative access.

🟢

If Mitigated

With proper monitoring and access controls, impact is limited to unauthorized access to specific user accounts that can be quickly detected and revoked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of target email addresses but no authentication. The vulnerability is simple to exploit once understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.9.1

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3201046/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Social Login' plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.9.1+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Social Login Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate oa-social-login

🧯 If You Can't Patch

  • Disable the Social Login plugin immediately.
  • Implement strict monitoring for unusual login activity and user privilege changes.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for Social Login version. If version is 5.9.0 or lower, you are vulnerable.

Check Version:

wp plugin get oa-social-login --field=version

Verify Fix Applied:

Verify Social Login plugin version is 5.9.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual login patterns from social authentication endpoints
  • User privilege escalation events
  • Multiple failed login attempts followed by successful social login

Network Indicators:

  • Unusual traffic to /wp-content/plugins/oa-social-login/ endpoints
  • Authentication requests from unexpected IPs

SIEM Query:

source="wordpress.log" AND ("oa-social-login" OR "social login") AND ("authentication" OR "login")

🔗 References

📤 Share & Export