Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

887+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Critical Authentication Bypass in WordPress Temporary Login Plugin
Critical Authentication Bypass in WordPress Temporary Login Plugin

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-7567

Critical Authentication Bypass in WordPress Temporary Login Plugin

A critical CVSS 9.8 authentication bypass in the WordPress Temporary Login plugin (versions up to 1.0.0) allows unauthenticated attackers to gain privileged WordPress access by supplying a non-scalar token value.

Dylan H.

Security Team

May 1, 2026
6 min read

Affected Products

  • WordPress Temporary Login Plugin versions up to and including 1.0.0

Executive Summary

A critical authentication bypass vulnerability (CVE-2026-7567) has been disclosed in the Temporary Login plugin for WordPress, affecting all versions up to and including 1.0.0. The flaw exists in the maybe_login_temporary_user() function, which fails to validate that the temp-login-token GET parameter is a scalar string before processing it. By passing a non-scalar value (such as an array), an attacker can bypass the token verification logic and gain unauthorized access to a WordPress installation.

CVSS Score: 9.8 (Critical) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Authentication bypass flaws of this nature represent a high-severity risk to any WordPress site using this plugin, as they allow full administrative or user-level access without any credentials. Immediate action is required: disable or remove the plugin until a patched version is available.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-7567
CVSS Score9.8 (Critical)
TypeAuthentication Bypass / Improper Input Validation (CWE-20)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
Confidentiality / Integrity / AvailabilityHigh / High / High
Published2026-05-01
Affected PluginTemporary Login for WordPress (≤ 1.0.0)

Affected Products

ProductAffected VersionsStatus
WordPress Temporary Login Plugin≤ 1.0.0Vulnerable

The Temporary Login plugin allows WordPress administrators to create time-limited login links for external users (contractors, support staff, clients) without sharing permanent credentials. The vulnerability in the token validation logic undermines the entire authentication model of the plugin.


Technical Details

Vulnerability Root Cause

The maybe_login_temporary_user() function retrieves the temp-login-token value directly from the $_GET superglobal and passes it to a comparison or lookup function without first verifying that the value is a scalar string.

In PHP, when an array is passed to functions that expect a scalar string (such as strcmp() or hash_equals()), the comparison often returns 0 (equal) or silently fails in a way that the surrounding conditional logic interprets as success. This is a classic PHP type juggling vulnerability — the code assumes the token is always a string, but PHP allows callers to pass arrays via HTTP query parameters.

Attack Chain

1. Attacker identifies a WordPress site running Temporary Login plugin <= 1.0.0
2. Attacker sends a GET request to the login endpoint:
   /?temp-login-token[]=arbitrary_value
3. PHP receives temp-login-token as an array instead of a string
4. maybe_login_temporary_user() passes array to comparison function
5. PHP type mismatch causes strcmp(array, string) to return 0 (treated as equal)
6. Token validation logic interprets return value 0 as successful match
7. Attacker is logged in as the user associated with the token (potentially admin)
8. Full WordPress admin panel access achieved with no credentials

PHP Type Juggling Explained

PHP allows query parameters to be passed as arrays using bracket notation:

Attacker request:
  GET /?temp-login-token[]=anything HTTP/1.1
 
PHP receives:
  $_GET['temp-login-token'] === ['anything']  (an array, not a string)
 
Vulnerable comparison:
  strcmp($_GET['temp-login-token'], $stored_token)
  // strcmp(array, string) returns NULL in PHP < 8.0
  // NULL == 0 evaluates to TRUE under loose comparison (==)
  // Result: authentication check passes

The secure fix requires calling is_string() on the token value before any comparison, and using strict comparison (===) with hash_equals() rather than loose comparison (==) against the result.


Impact Assessment

Impact AreaDescription
Unauthorized Admin AccessAttacker can gain full WordPress administrator access
Content TamperingModification or deletion of posts, pages, and media
Plugin/Theme InstallationUpload of malicious plugins or themes for persistent backdoors
User Account ManipulationCreate, modify, or delete user accounts including admins
Data ExfiltrationAccess to all stored content, user data, and plugin configuration
DefacementFull site defacement or redirection to malicious content
File System AccessFile manager access can be used to upload a PHP backdoor script

Recommendations

Immediate Actions

  1. Disable the Temporary Login plugin immediately if running version ≤ 1.0.0
  2. Delete active temporary login tokens via the plugin dashboard before disabling
  3. Audit WordPress admin accounts for any unauthorized additions or changes
  4. Review access logs for suspicious ?temp-login-token[]= requests

Patching

  • Check the WordPress plugin repository for an updated version of the Temporary Login plugin
  • If no patch is available, remove the plugin entirely and use an alternative access method (manual user creation with time-limited accounts)

Hardening Measures

- Deploy a WAF rule blocking requests where temp-login-token contains bracket notation
  Pattern: block any URL parameter matching /temp-login-token\[/ in access logs
- Enable WordPress admin email notifications for new admin user creation
- Use a security plugin (Wordfence, Sucuri) to monitor for login anomalies
- Restrict wp-login.php and plugin login endpoints by IP where possible
- Enforce PHP 8.0+ where strcmp() with non-scalar input throws a TypeError

Detection Indicators

IndicatorDescription
GET requests with temp-login-token[]= in the URLExploitation attempt via array injection
Sudden new WordPress admin accountsPost-exploitation account creation
Plugin or theme uploads from unexpected IPsBackdoor installation attempt
PHP files with base64-encoded content in wp-contentPossible obfuscated backdoor upload
WordPress admin actions outside business hoursSuspicious unauthorized access

Post-Remediation Checklist

  1. Verify plugin removed or updated to a patched version
  2. Audit all WordPress user accounts — remove any unauthorized admin accounts
  3. Change all admin passwords and revoke active sessions (wp_session_tokens)
  4. Scan wp-content for new or modified PHP files that could be backdoors
  5. Review file system integrity using a WordPress security scanner
  6. Check plugin and theme directories for unauthorized additions
  7. Enable two-factor authentication for all admin-level WordPress accounts
  8. Update WAF rules to block array-based GET parameter injection attempts

References

  • NIST NVD — CVE-2026-7567
  • WordPress Plugin Repository — Temporary Login
  • OWASP — PHP Type Juggling Vulnerabilities
  • CWE-20: Improper Input Validation
#CVE-2026-7567#WordPress#Authentication Bypass#Plugin Vulnerability#CMS Security

Related Articles

CVE-2026-41940: WebPros cPanel & WHM and WP2 Missing Authentication Vulnerability

WebPros cPanel, WHM, and WP2 (WordPress Squared) contain a critical authentication bypass in the login flow, allowing unauthenticated remote attackers to gain unauthorized access to the hosting control panel. Added to CISA KEV as actively exploited.

6 min read

CVE-2026-39440: FunnelFormsPro WordPress Plugin Remote Code Inclusion (CVSS 9.9)

A critical code injection vulnerability in the FunnelFormsPro WordPress plugin through version 3.8.1 allows remote code inclusion, enabling attackers to...

4 min read

CVE-2026-3844 — Breeze Cache WordPress Plugin Unauthenticated File Upload

A critical unauthenticated file upload vulnerability in the Breeze Cache WordPress plugin allows attackers to upload arbitrary files to affected servers...

6 min read
Back to all Security Alerts