Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-50142 | The WP 2FA with Telegram plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 3.0. This is due to the two-factor code being stored in a cookie, which makes it possible to bypass two-factor authentication. |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 19 Oct 2024 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dueclic
Dueclic wp 2fa With Telegram |
|
| Weaknesses | CWE-565 | |
| CPEs | cpe:2.3:a:dueclic:wp_2fa_with_telegram:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Dueclic
Dueclic wp 2fa With Telegram |
Tue, 15 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Oct 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WP 2FA with Telegram plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 3.0. This is due to the two-factor code being stored in a cookie, which makes it possible to bypass two-factor authentication. | |
| Title | WP 2FA with Telegram <= 3.0 - Two-Factor Authentication Bypass | |
| Weaknesses | CWE-784 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:23:54.200Z
Reserved: 2024-10-10T14:24:51.483Z
Link: CVE-2024-9820
Updated: 2024-10-15T13:40:54.368Z
Status : Analyzed
Published: 2024-10-15T02:15:03.170
Modified: 2024-10-19T00:44:10.420
Link: CVE-2024-9820
No data.
OpenCVE Enrichment
No data.
EUVD