PT-2026-36312 · WordPress · Temporary Login
Published
2026-05-01
·
Updated
2026-05-01
·
CVE-2026-7567
CVSS v3.1
9.8
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Temporary Login plugin for WordPress versions prior to 1.0.1
Description
An authentication bypass exists due to improper input validation in the
maybe login temporary user() function. The function fails to verify that the temp-login-token GET parameter is a scalar string. If this parameter is provided as an array, the empty() check is bypassed and sanitize key() returns an empty string. This empty string is then used as the meta value in the get users() function. Since WordPress ignores an empty meta value, it returns all users associated with the temporary login token meta key, allowing an unauthenticated attacker to authenticate as any active temporary login user via a crafted GET request.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Authentication Bypass Using an Alternate Path or Channel
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Temporary Login