Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-52007 | The User Verification WordPress plugin before 1.0.94 was affected by an Auth Bypass security vulnerability. To bypass authentication, we only need to know the user’s username. Depending on whose username we know, which can be easily queried because it is usually public data, we may even be given an administrative role on the website. |
Wed, 02 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-02T15:30:53.916Z
Reserved: 2022-12-23T11:09:44.491Z
Link: CVE-2022-4693
Updated: 2024-08-03T01:48:39.545Z
Status : Modified
Published: 2023-01-23T15:15:16.190
Modified: 2025-04-02T16:15:28.640
Link: CVE-2022-4693
No data.
OpenCVE Enrichment
No data.
EUVD