The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-login-token' GET parameter is a scalar string before processing it. When the parameter is supplied as an array, PHP's empty() check is bypassed and sanitize_key() returns an empty string, which is then passed as the meta_value to get_users(). WordPress ignores an empty meta_value and returns all users matching the meta_key '_temporary_login_token', allowing authentication without a valid token. This makes it possible for unauthenticated attackers to authenticate as any active temporary login user by sending a single crafted GET request.
PUBLISHED5.2CWE-288
Temporary Login <= 1.0.0 - Authentication Bypass to Account Takeover
Problem type
Affected products
elemntor
Temporary Login
<= 1.0.0 - AFFECTED
References
wordfence.com
https://www.wordfence.com/threat-intel/vulnerabilities/id/f97c669b-86c1-4873-a050-76972f494099?source=cve
plugins.trac.wordpress.org
https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/options.php#L157
plugins.trac.wordpress.org
https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/options.php#L157
plugins.trac.wordpress.org
https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/admin.php#L135
plugins.trac.wordpress.org
https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/admin.php#L135
plugins.trac.wordpress.org
https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/admin.php#L179
plugins.trac.wordpress.org
https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/admin.php#L179
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-7567Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-7567",
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"dateUpdated": "2026-05-01T09:26:06.824Z",
"dateReserved": "2026-04-30T20:58:51.799Z",
"datePublished": "2026-05-01T09:26:06.824Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence",
"dateUpdated": "2026-05-01T09:26:06.824Z"
},
"title": "Temporary Login <= 1.0.0 - Authentication Bypass to Account Takeover",
"descriptions": [
{
"lang": "en",
"value": "The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-login-token' GET parameter is a scalar string before processing it. When the parameter is supplied as an array, PHP's empty() check is bypassed and sanitize_key() returns an empty string, which is then passed as the meta_value to get_users(). WordPress ignores an empty meta_value and returns all users matching the meta_key '_temporary_login_token', allowing authentication without a valid token. This makes it possible for unauthenticated attackers to authenticate as any active temporary login user by sending a single crafted GET request."
}
],
"affected": [
{
"vendor": "elemntor",
"product": "Temporary Login",
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "1.0.0"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel",
"cweId": "CWE-288",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f97c669b-86c1-4873-a050-76972f494099?source=cve"
},
{
"url": "https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/options.php#L157"
},
{
"url": "https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/options.php#L157"
},
{
"url": "https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/admin.php#L135"
},
{
"url": "https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/admin.php#L135"
},
{
"url": "https://plugins.trac.wordpress.org/browser/temporary-login/trunk/core/admin.php#L179"
},
{
"url": "https://plugins.trac.wordpress.org/browser/temporary-login/tags/1.0.0/core/admin.php#L179"
}
],
"metrics": [
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
}
}
],
"timeline": [
{
"time": "2026-04-30T20:59:11.000Z",
"lang": "en",
"value": "Disclosed"
}
],
"credits": [
{
"lang": "en",
"value": "TANG Cheuk Hei",
"type": "finder"
}
]
}
}
}