The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58737 | The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | WP 2FA <= 2.5.0 - Insecure Direct Object Reference to Arbitrary Email Sending | |
| Weaknesses | CWE-639 |
Tue, 03 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:23:23.356Z
Reserved: 2023-12-04T20:15:47.572Z
Link: CVE-2023-6506
Updated: 2024-08-02T08:35:13.232Z
Status : Modified
Published: 2024-01-11T07:15:08.810
Modified: 2026-04-08T19:18:56.547
Link: CVE-2023-6506
No data.
OpenCVE Enrichment
No data.
EUVD