Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2418: CWE-287 Improper Authentication in Login with Salesforce

0
Critical
VulnerabilityCVE-2026-2418cvecve-2026-2418cwe-287
Published: Thu Mar 05 2026 (03/05/2026, 06:00:03 UTC)
Source: CVE Database V5
Product: Login with Salesforce

Description

CVE-2026-2418 is a critical authentication bypass vulnerability in the Login with Salesforce WordPress plugin versions up to 1. 0. 2. The flaw arises because the plugin does not properly validate whether a user is authorized to log in via Salesforce, allowing attackers to impersonate any user, including administrators, by simply knowing their email address. This vulnerability enables unauthenticated attackers to gain unauthorized access without needing passwords or additional credentials. No known exploits are currently in the wild, but the impact could be severe if weaponized. The affected plugin is used to integrate Salesforce authentication with WordPress sites, making organizations relying on this integration particularly at risk. Mitigation requires immediate patching or disabling the plugin until a fix is available, and monitoring for suspicious login activity. Countries with significant Salesforce and WordPress usage, especially those with many enterprises using Salesforce integrations, are most at risk. Due to the ease of exploitation and high impact on confidentiality and integrity, this vulnerability is assessed as critical.

AI-Powered Analysis

AILast updated: 03/05/2026, 06:32:34 UTC

Technical Analysis

CVE-2026-2418 is an authentication bypass vulnerability categorized under CWE-287 (Improper Authentication) found in the Login with Salesforce WordPress plugin through version 1.0.2. The vulnerability stems from the plugin's failure to properly verify that users attempting to log in via Salesforce are authorized to do so. Specifically, the plugin allows unauthenticated users to authenticate as any user on the WordPress site, including administrators, by simply providing a valid email address associated with that user. This bypasses normal authentication mechanisms and effectively grants attackers full access to the WordPress site without requiring passwords or multi-factor authentication. The vulnerability affects all versions up to 1.0.2, with no patches currently available. Although no known exploits have been reported in the wild, the flaw's simplicity and severity make it a significant threat. The plugin is commonly used to enable Salesforce single sign-on (SSO) for WordPress sites, often in enterprise environments where Salesforce is heavily integrated. The lack of proper authorization checks means attackers can impersonate high-privilege users, potentially leading to data breaches, site defacement, or further compromise of connected systems. The vulnerability was publicly disclosed in March 2026, with WPScan as the assigner. No CVSS score has been assigned yet.

Potential Impact

The impact of CVE-2026-2418 is severe for organizations using the Login with Salesforce plugin to integrate Salesforce authentication with their WordPress sites. Successful exploitation allows attackers to bypass authentication entirely and assume the identity of any user, including administrators, by knowing only the user's email address. This can lead to full site compromise, unauthorized access to sensitive data, modification or deletion of content, installation of malicious code, and lateral movement within the network. Enterprises relying on Salesforce for identity management and WordPress for content management or customer-facing portals are particularly vulnerable. The breach of administrator accounts can result in loss of control over the website, reputational damage, regulatory penalties, and potential exposure of customer or business data. Since no authentication or user interaction is required, the attack surface is broad and can be automated, increasing the risk of widespread exploitation once a public exploit is developed. The absence of patches further exacerbates the threat, making timely mitigation critical.

Mitigation Recommendations

Organizations should immediately audit their WordPress sites for the presence of the Login with Salesforce plugin and verify the version in use. If version 1.0.2 or earlier is installed, disable the plugin until a security patch or update is released by the vendor. In the absence of an official patch, consider removing the plugin entirely or replacing it with alternative, secure Salesforce authentication solutions that properly validate user authorization. Implement additional monitoring and alerting for unusual login activities, especially logins from unknown IP addresses or multiple failed attempts followed by successful logins. Enforce strong access controls and multi-factor authentication on WordPress administrator accounts independent of the plugin. Review and restrict user email exposure to minimize attackers' ability to guess valid emails. Regularly back up WordPress sites and maintain incident response plans to quickly recover from potential compromises. Engage with the plugin vendor or community to track patch releases and apply updates promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-02-12T18:55:02.208Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a9206cd1a09e29cbe6d01e

Added to database: 3/5/2026, 6:19:24 AM

Last enriched: 3/5/2026, 6:32:34 AM

Last updated: 3/5/2026, 8:41:53 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses