<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-7567 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-7567/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 10:15:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-7567/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Temporary Login Plugin Authentication Bypass (CVE-2026-7567)</title><link>https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</link><pubDate>Fri, 01 May 2026 10:15:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wordpress-temp-login-auth-bypass/</guid><description>The Temporary Login plugin for WordPress versions up to 1.0.0 is vulnerable to authentication bypass due to improper input validation, allowing unauthenticated attackers to log in as arbitrary temporary users by sending a specially crafted GET request.</description><content:encoded><![CDATA[<p>CVE-2026-7567 is an authentication bypass vulnerability that affects the Temporary Login plugin for WordPress, specifically versions up to and including 1.0.0. The vulnerability stems from a failure to properly validate the &rsquo;temp-login-token&rsquo; GET parameter within the <code>maybe_login_temporary_user()</code> function. By supplying an array as the value for this parameter, attackers can circumvent the intended <code>empty()</code> check. This leads to the <code>sanitize_key()</code> function returning an empty string, which is then used in a database query to fetch users. WordPress ignores empty <code>meta_value</code> parameters, causing the query to return all users with the <code>_temporary_login_token</code> meta key. Consequently, an unauthenticated attacker can effectively authenticate as any user with an active temporary login session by sending a single, maliciously crafted GET request. This poses a severe risk to website security, as it allows unauthorized access to user accounts and potentially sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Temporary Login plugin (version &lt;= 1.0.0).</li>
<li>The attacker crafts a malicious GET request targeting the WordPress site&rsquo;s login endpoint, including the &rsquo;temp-login-token&rsquo; parameter as an array (e.g., <code>temp-login-token[]=</code>).</li>
<li>The web server receives the GET request.</li>
<li>The <code>maybe_login_temporary_user()</code> function processes the request.</li>
<li>Due to improper input validation, the <code>empty()</code> check is bypassed when the &rsquo;temp-login-token&rsquo; parameter is an array.</li>
<li><code>sanitize_key()</code> processes the array and returns an empty string as the meta_value.</li>
<li>WordPress executes a database query using the empty meta_value, effectively retrieving all users with active temporary login tokens.</li>
<li>The attacker is granted unauthorized access to the account of a targeted temporary user, bypassing normal authentication procedures.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7567 allows unauthenticated attackers to bypass login restrictions and gain unauthorized access to WordPress user accounts utilizing the vulnerable Temporary Login plugin. The severity is high, as it allows complete compromise of user accounts without requiring any valid credentials. The impact includes potential data theft, account takeover, website defacement, and other malicious activities, depending on the privileges of the compromised user account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the available patch or upgrade the Temporary Login plugin to a version greater than 1.0.0 to remediate CVE-2026-7567.</li>
<li>Deploy the Sigma rule <code>Detect WordPress Temporary Login Authentication Bypass Attempt</code> to detect exploitation attempts by monitoring HTTP requests with array-based <code>temp-login-token</code> parameters in the query string.</li>
<li>Implement input validation on the web server to reject requests containing array-based parameters where scalar strings are expected.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication bypass</category><category>wordpress</category><category>plugin vulnerability</category><category>cve-2026-7567</category><category>cloud</category></item></channel></rss>