The Two Factor (2FA) Authentication via Email plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 1.9.8. This is because the SS88_2FAVE::wp_login() method only enforces the 2FA requirement if the 'token' HTTP GET parameter is undefined, which makes it possible to bypass two-factor authentication by supplying any value in the 'token' parameter during login, including an empty one.
Metrics
Affected Vendors & Products
References
History
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ss88 Uk
Ss88 Uk two Factor (2fa) Authentication Via Email Wordpress Wordpress wordpress |
|
| Vendors & Products |
Ss88 Uk
Ss88 Uk two Factor (2fa) Authentication Via Email Wordpress Wordpress wordpress |
Thu, 19 Feb 2026 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Two Factor (2FA) Authentication via Email plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 1.9.8. This is because the SS88_2FAVE::wp_login() method only enforces the 2FA requirement if the 'token' HTTP GET parameter is undefined, which makes it possible to bypass two-factor authentication by supplying any value in the 'token' parameter during login, including an empty one. | |
| Title | Two Factor (2FA) Authentication via Email <= 1.9.8 - Two-Factor Authentication Bypass via token | |
| Weaknesses | CWE-20 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-02-19T04:36:05.735Z
Updated: 2026-02-19T04:36:05.735Z
Reserved: 2025-11-23T14:04:31.558Z
Link: CVE-2025-13587
No data.
No data.
No data.