The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied during the social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
History

Wed, 08 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Thenbrent
Thenbrent social Connect Plugin
CPEs cpe:2.3:a:thenbrent:social_connect_plugin:*:*:*:*:*:*:*:*
Vendors & Products Thenbrent
Thenbrent social Connect Plugin
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Title Social Connect <= 1.2 - Authentication Bypass
Weaknesses CWE-288

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:43:08.845Z

Reserved: 2024-05-01T16:02:35.514Z

Link: CVE-2024-4393

cve-icon Vulnrichment

Updated: 2024-08-01T20:40:47.142Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-08T03:15:07.020

Modified: 2026-04-08T17:18:53.560

Link: CVE-2024-4393

cve-icon Redhat

No data.