The Login/Signup Popup plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on several functions in versions up to, and including, 1.4. This makes it possible for authenticated attackers to inject arbitrary web scripts into the plugin settings that execute if they can successfully trick a user into performing an action such as clicking on a link.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-24157 | The Login/Signup Popup plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on several functions in versions up to, and including, 1.4. This makes it possible for authenticated attackers to inject arbitrary web scripts into the plugin settings that execute if they can successfully trick a user into performing an action such as clicking on a link. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Login/Signup Popup < 1.5 - Missing Authorization |
Sat, 21 Dec 2024 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:10:19.092Z
Reserved: 2023-06-06T13:01:28.321Z
Link: CVE-2020-36715
Updated: 2024-08-04T17:37:06.670Z
Status : Modified
Published: 2023-06-07T02:15:11.920
Modified: 2026-04-08T18:17:09.603
Link: CVE-2020-36715
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD