Beware: The “Really Simple Security” That’s Really Not! (CVE-2024-10924)
In a plot twist worthy of a cyber-thriller, Really Simple Security versions 9.0.0 to 9.1.1.1 have been exposed to an authentication bypass vulnerability (CVE-2024-10924). This flaw lets unauthorized users waltz into sites as any user, including admins. So, if you’ve got a WordPress site, it’s time to update faster than a caffeinated coder!

Hot Take:
Well, folks, it seems like the “Really Simple Security” plugin just got a crash course in irony! Who knew that the simplicity in their name would extend to letting anyone waltz into your site like it’s a 24-hour diner? Time to grab some popcorn and watch the chaos unfold as hackers play musical chairs with admin accounts!
Key Points:
- A vulnerability in the “Really Simple Security” plugin affects versions 9.0.0 to 9.1.1.1.
- Unauthenticated attackers can bypass authentication and log in as any user, even administrators.
- The issue arises when the “Two-Factor Authentication” setting is enabled, although it’s disabled by default.
- The exploit was tested on WordPress 6.7.0 and Ubuntu 24.04.1 LTS using Python 3.12.3.
- Discovered by István Márton, the exploit is cataloged under CVE-2024-10924.
Already a member? Log in here