CVE-2026-7567 PUBLISHED

Temporary Login <= 1.0.0 - Authentication Bypass to Account Takeover

Assigner: Wordfence
Reserved: 30.04.2026 Published: 01.05.2026 Updated: 01.05.2026

The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-login-token' GET parameter is a scalar string before processing it. When the parameter is supplied as an array, PHP's empty() check is bypassed and sanitize_key() returns an empty string, which is then passed as the meta_value to get_users(). WordPress ignores an empty meta_value and returns all users matching the meta_key '_temporary_login_token', allowing authentication without a valid token. This makes it possible for unauthenticated attackers to authenticate as any active temporary login user by sending a single crafted GET request.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor elemntor
Product Temporary Login
Versions Default: unaffected
  • affected from 0 to 1.0.0 (incl.)

Credits

  • TANG Cheuk Hei finder

References

Problem Types

  • CWE-288 Authentication Bypass Using an Alternate Path or Channel CWE