Keypoints
- A critical authentication bypass affecting Really Simple Security (Free, Pro, Pro Multisite) was discovered, impacting over 4 million WordPress sites.
- The vulnerability (affecting versions 9.0.0 through 9.1.1.1) lets unauthenticated attackers bypass Two-Factor Authentication and log in as any user, including administrators.
- Wordfence authored and deployed a firewall rule for Premium/Care/Response customers on Nov 6, 2024; Free users receive the same protection on Dec 6, 2024.
- The issue stems from improper error handling in the pluginβs two-factor REST API (the check_login_and_get_user function returns an unhandled WP_REST_Response on failure).
- Vendor patched Pro plugins on Nov 12 and the Free plugin on Nov 14, 2024, and coordinated forced updates via WordPress.org to push version 9.1.2.
- Pro versions and sites without valid licenses (which may not auto-update) are also affected; site owners and hosts are urged to verify updates and scan for unpatched instances.
MITRE Techniques
- No MITRE ATT&CK techniques were explicitly mentioned in the article.
Indicators of Compromise
- [Domain] plugin and advisory domains β wordpress.org/plugins/really-simple-ssl, really-simple-ssl.com, wordfence.com
- [Plugin Version] affected and patched versions β affected 9.0.0β9.1.1.1, patched 9.1.2
- [Code/Function names] code references useful for analysis β check_login_and_get_user, skip_onboarding, Rsssl_Two_Factor_On_Board_Api
ββββ
The Really Simple Security plugin (formerly Really Simple SSL) contained a critical authentication bypass in its two-factor REST API that could be triggered by unauthenticated requests. Because the pluginβs check_login_and_get_user function returned an unhandled WP_REST_Response on verification failure, processing continued and authenticate_and_redirect could log in as the user ID supplied in the request. The vendor released fixes (Pro: Nov 12, Free: Nov 14, 2024), Wordfence pushed firewall rules to Premium customers on Nov 6 (Free on Dec 6), and WordPress.org initiated forced updates to version 9.1.2; site owners and hosts should immediately confirm their sites run 9.1.2 and scan for unpatched installations.
ββββ
Read more: https://www.wordfence.com/blog/2024/11/really-simple-security-vulnerability