Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ss88 Uk
Ss88 Uk two Factor (2fa) Authentication Via Email Wordpress Wordpress wordpress |
|
| Vendors & Products |
Ss88 Uk
Ss88 Uk two Factor (2fa) Authentication Via Email Wordpress Wordpress wordpress |
Thu, 19 Feb 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Two Factor (2FA) Authentication via Email plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 1.9.8. This is because the SS88_2FAVE::wp_login() method only enforces the 2FA requirement if the 'token' HTTP GET parameter is undefined, which makes it possible to bypass two-factor authentication by supplying any value in the 'token' parameter during login, including an empty one. | |
| Title | Two Factor (2FA) Authentication via Email <= 1.9.8 - Two-Factor Authentication Bypass via token | |
| Weaknesses | CWE-20 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:36:20.584Z
Reserved: 2025-11-23T14:04:31.558Z
Link: CVE-2025-13587
Updated: 2026-02-19T17:04:08.899Z
Status : Deferred
Published: 2026-02-19T07:17:31.087
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-13587
No data.
OpenCVE Enrichment
Updated: 2026-04-22T20:00:08Z