CVE-2026-7567
CRITICAL · 9.8 EPSS 0.1%Published 2 days ago; high severity and clear attack path, but no KEV, no confirmed PoC, no patch deployed yet.
What: Authentication bypass in WordPress "Temporary Login" plugin (v1.0.0 and earlier) via malformed token parameter; CVSS 9.8 CRITICAL allowing unauthenticated account takeover.
Why it matters: High-severity flaw with trivial exploitation (single crafted GET request); no KEV listing yet but social chatter claims 40,000+ vulnerable sites. No public PoC confirmed in posts, but vulnerability is straightforward to exploit given the documented flaw in empty() and sanitize_key() handling.
Where it's seen: Social media amplification (Twitter, Bluesky) from security feeds and researchers; vendor advisory expected imminently; defender awareness is building but no in-the-wild exploitation reports yet.
RISK: CRITICAL — Trivial exploitation, unauthenticated account takeover, high CVSS, widespread plugin.
AttackerKB
view on attackerkb.com →The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-login-token' GET parameter is a scalar string before processing it. When the parameter is supplied as an array, PHP's empty() check is bypassed and sanitize_key() returns an empty string, which is then passed as the meta_value to get_users(). WordPress ignores an empty meta_value and returns all users matching the meta_key '_temporary_login_token', allowing authentication without a valid token. This makes it possible for unauthenticated attackers to authenticate as any active temporary login user by sending a single crafted GET request.
Public PoCs on GitHub 2 repos
- vintagesucks/awesome-stars ★ 12
:star: A curated list of my GitHub stars
- getquoteonline/NSNPartLookup.com-Lookup-Order-NSN-NIIN-Cage-Code-Parts ★ 0
NSNPartLookup.com – Lookup & Order NSN, NIIN, Cage Code Parts
Articles & coverage 15 articles
- NVD - CVE-2026-7567
Description The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. | URL | Source(s) | Tag(s) | | --- | --- | --- | | | Wordfence | | | | Wordfence | | | | Wordfence | | | | Wordfence | | | | Wordfence | | | | Wordfence | | | | Wordfence | | Weakness Enumeration | CWE-ID | CWE Name | Source | | --- | --- | --- | | CWE-
- CVE-2016-7567 - CVE Details, Severity, and Analysis | Strobes VI
CVE DatabaseThreat ActorsRansomwareSupply ChainAPI Docs. Visit Strobes.coSign Up for Strobes. Deploy autonomous AI agents that reason, exploit, and validate complex vulnerability chains — not another scanner, an agentic system that thinks like a senior pentester. # CVE-2016-7567. CVE-2016-7567 is a critical severity vulnerability with a CVSS score of 9.8. * 1Critical severity (CVSS 9.8/10). Test t
- Threats Tagged 'cve-2026-7567' | Threat Radar
# Threats Tagged 'cve-2026-7567'. View all threats tagged with 'cve-2026-7567'. Filter and sort to focus on specific types of threats. Start free, then upgrade once to turn Radar into an automated delivery engine for your security stack. API access activates after upgrading in Console -> Billing. Breach by OffSeqOFFSEQFRIENDS — 25% OFF. ### Check if your credentials are on the dark web. Instant br
- CVE-2016-7567: CVE-2016-7567 - Vulnerability Platform
Remote attackers can exploit this vulnerability to cause unspecified impacts. Have questions about the vulnerability? See if Shenlong's analysis helps!
- CVE-2026-27567 Detail - NVD
Payload is a free and open source headless content management system. Prior to 3.75.0, a Server-Side Request Forgery (SSRF) vulnerability exists
› NVD details 1 CWE ·0 vendors · 7 refs expand
Description
The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-login-token' GET parameter is a scalar string before processing it. When the parameter is supplied as an array, PHP's empty() check is bypassed and sanitize_key() returns an empty string, which is then passed as the meta_value to get_users(). WordPress ignores an empty meta_value and returns all users matching the meta_key '_temporary_login_token', allowing authentication without a valid token. This makes it possible for unauthenticated attackers to authenticate as any active temporary login user by sending a single crafted GET request.
Weaknesses
References
- https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/admin.php#L135
- https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/admin.php#L179
- https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/options.php#L157
- https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/admin.php#L135
- https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/admin.php#L179
- https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/options.php#L157
- https://www.wordfence.com/threat-intel/vulnerabilities/id/f97c669b-86c1-4873-a050-76972f494099?source=cve
Top posts driving the trend
@taku888infinityX · 5/3/202640,000+ Sites Exposed: Critical 9.8 CVSS Flaw Grants Total WordPress Account Takeover https://t.co/u9BkltyJUA CVE-2026-7567 https://t.co/irpyjU6qwE
♥ 2 · ↻ 0 · 💬 0- @thehackerwire.bsky.socialBluesky · 5/1/2026
🔴 CVE-2026-7567 - Critical (9.8) The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to... https://www.thehackerwire.com/vulnerability/CVE-2026-7567/ #infosec #cybersecurity #CVE #vulnerability #security #patchstack
♥ 0 · ↻ 0 · 💬 0 - TH@TheRabbitPyX · 5/1/2026
🔑 CVE-2026-7567: Authentication bypass vulnerability in WordPress "Temporary Login" plugin (v1.0.0 and below). Update immediately to prevent unauthorized access. #WordPress #AuthenticationBypass #Security #PluginSecurity https://t.co/JaLoPXl0x8
♥ 0 · ↻ 0 · 💬 1 - VU@VulmonFeedsX · 5/1/2026
CVE-2026-7567 Authentication Bypass in Temporary Login Plugin for WordPr... https://t.co/kLSfwdo3Sn Don't wait vulnerability scanning results: https://t.co/oh1APvMMnd
♥ 0 · ↻ 0 · 💬 0