Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34025 | The WP User Switch plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0.2. This is due to incorrect authentication checking in the 'wpus_allow_user_to_admin_bar_menu' function with the 'wpus_who_switch' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the username. |
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | WP User Switch <= 1.0.2 - Authenticated (Subscriber+) Authentication Bypass via Cookie | |
| Weaknesses | CWE-288 |
Mon, 23 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:30:37.994Z
Reserved: 2023-05-05T17:11:57.789Z
Link: CVE-2023-2546
Updated: 2024-08-02T06:26:09.731Z
Status : Modified
Published: 2023-06-06T02:15:09.943
Modified: 2026-04-08T19:18:16.177
Link: CVE-2023-2546
No data.
OpenCVE Enrichment
No data.
EUVD