Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34371: Missing Authorization in Hamid Alinia Login with phone number

0
Unknown
VulnerabilityCVE-2024-34371cvecve-2024-34371
Published: Mon May 06 2024 (05/06/2024, 19:04:12 UTC)
Source: CVE Database V5
Vendor/Project: Hamid Alinia
Product: Login with phone number

Description

Missing Authorization vulnerability in Hamid Alinia Login with phone number login-with-phone-number.This issue affects Login with phone number: from n/a through <= 1.7.18.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 04:47:33 UTC

Technical Analysis

CVE-2024-34371 identifies a Missing Authorization vulnerability in the 'Login with phone number' plugin by Hamid Alinia, affecting all versions up to 1.7.18. This plugin facilitates user authentication via phone numbers, a common alternative to traditional username-password logins. The vulnerability arises because the plugin fails to enforce proper authorization checks on certain operations or endpoints, allowing unauthenticated or unauthorized users to perform actions that should be restricted. Missing authorization means that while authentication might be required, the system does not verify whether the authenticated user has the rights to execute specific functions, or in some cases, no authentication is required at all. This can lead to unauthorized data access, modification, or other malicious activities such as privilege escalation or account takeover. Although no public exploits have been reported yet, the flaw is critical in nature because it directly undermines the security model of user authentication. The plugin is widely used in PHP-based web applications, particularly WordPress environments, where phone number login is implemented to enhance user convenience. The lack of a CVSS score indicates that the vulnerability is newly disclosed and not yet fully assessed, but the technical details confirm the severity of missing authorization controls in an authentication context.

Potential Impact

The impact of this vulnerability is significant for organizations relying on the 'Login with phone number' plugin for user authentication. Unauthorized users could bypass access controls, leading to unauthorized access to user accounts or sensitive data. This compromises confidentiality and integrity, potentially allowing attackers to impersonate legitimate users, escalate privileges, or manipulate application data. The availability impact is less direct but could occur if attackers disrupt authentication workflows or cause denial of service through unauthorized actions. Organizations handling sensitive user information, financial data, or personal identifiers via phone number authentication are at particular risk. The vulnerability could also undermine user trust and lead to regulatory compliance issues, especially in regions with strict data protection laws. Since no known exploits are in the wild, the immediate threat is moderate, but the potential for exploitation is high once attackers develop proof-of-concept code. The scope includes all installations of the affected plugin versions, which may be widespread in small to medium enterprises and websites using phone number login features.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first monitor for an official patch or update from the plugin developer and apply it promptly once available. In the absence of a patch, administrators should review and restrict access to any endpoints or functions related to phone number login to trusted users only, possibly by implementing additional server-side authorization checks. Conducting a thorough code audit of the plugin’s authentication and authorization logic can help identify and temporarily fix missing authorization controls. Employing Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the login endpoints can reduce exploitation risk. Additionally, organizations should enforce multi-factor authentication (MFA) where possible to add a layer of security beyond the vulnerable plugin. Regularly monitoring logs for unusual login attempts or access patterns related to phone number authentication is also recommended. Finally, educating developers and administrators about secure authorization practices will help prevent similar issues in custom or third-party plugins.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-05-02T11:32:34.322Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7432e6bfc5ba1def6351

Added to database: 4/1/2026, 7:38:26 PM

Last enriched: 4/2/2026, 4:47:33 AM

Last updated: 4/6/2026, 9:09:19 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses