Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13587: CWE-20 Improper Input Validation in ss88_uk Two Factor (2FA) Authentication via Email

0
Medium
VulnerabilityCVE-2025-13587cvecve-2025-13587cwe-20
Published: Thu Feb 19 2026 (02/19/2026, 04:36:05 UTC)
Source: CVE Database V5
Vendor/Project: ss88_uk
Product: Two Factor (2FA) Authentication via Email

Description

The Two Factor (2FA) Authentication via Email plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 1.9.8. This is because the SS88_2FAVE::wp_login() method only enforces the 2FA requirement if the 'token' HTTP GET parameter is undefined, which makes it possible to bypass two-factor authentication by supplying any value in the 'token' parameter during login, including an empty one.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:31:59 UTC

Technical Analysis

CVE-2025-13587 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the ss88_uk Two Factor (2FA) Authentication via Email plugin for WordPress. The vulnerability exists because the plugin's authentication method, SS88_2FAVE::wp_login(), only enforces the 2FA requirement if the 'token' HTTP GET parameter is not present. If an attacker supplies any value for the 'token' parameter, including an empty string, the 2FA enforcement is bypassed, allowing login without completing the second authentication factor. This flaw effectively nullifies the additional security layer provided by 2FA, potentially enabling attackers with valid user credentials to gain unauthorized access. The vulnerability affects all plugin versions up to and including 1.9.8. The CVSS v3.1 score is 6.5 (medium severity), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability's root cause is improper input validation of the 'token' parameter, a common security oversight that allows bypassing critical security controls.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the integrity of user authentication processes on WordPress sites using the affected plugin. Attackers who can authenticate with valid credentials can bypass 2FA, potentially gaining unauthorized access to sensitive systems, administrative dashboards, or user accounts. This can lead to unauthorized changes, data manipulation, or further lateral movement within the network. The absence of confidentiality and availability impact reduces the risk of data leakage or service disruption but does not diminish the threat to system integrity. Organizations relying on this plugin for securing critical web portals, especially those handling personal data under GDPR, face compliance risks and potential reputational damage. The vulnerability is particularly concerning for sectors with high reliance on WordPress, such as government, education, and e-commerce, where 2FA is a key security control.

Mitigation Recommendations

1. Monitor the vendor's communications closely and apply security patches immediately once available. 2. Until a patch is released, consider disabling the affected plugin or replacing it with a more secure 2FA solution that properly validates input parameters. 3. Implement additional server-side validation to ensure the 'token' parameter is correctly handled and cannot be manipulated to bypass 2FA. 4. Enforce strict logging and monitoring of login attempts, focusing on anomalous usage of the 'token' parameter or unusual login patterns. 5. Conduct regular security audits of WordPress plugins and configurations to identify and remediate similar input validation issues. 6. Educate administrators and users about the risks of plugin vulnerabilities and encourage the use of strong, unique credentials alongside 2FA. 7. Consider implementing Web Application Firewalls (WAF) rules to detect and block suspicious requests manipulating the 'token' parameter.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-23T14:04:31.558Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f26aea4a407a3bdfd0

Added to database: 2/19/2026, 4:56:18 AM

Last enriched: 2/19/2026, 5:31:59 AM

Last updated: 2/21/2026, 12:16:36 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats