Two Factor (2FA) Authentication via Email <= 1.9.8 - Two-Factor Authentication Bypass via token

Improper Input Validation
CVE CVE-2025-13587
CVSS Medium (6.5)
Publicly Published February 18, 2026
Last Updated February 19, 2026
Researcher Ulyses Saicha
Description

The Two Factor (2FA) Authentication via Email plugin for WordPress is vulnerable to Two-Factor Authentication Bypass in versions up to, and including, 1.9.8. This is because the SS88_2FAVE::wp_login() method only enforces the 2FA requirement if the 'token' HTTP GET parameter is undefined, which makes it possible to bypass two-factor authentication by supplying any value in the 'token' parameter during login, including an empty one.

References

1 affected software package

Software Type Plugin
Software Slug two-factor-2fa-via-email (view on wordpress.org)
Patched? Yes
Affected Version
  • <= 1.9.8
Patched Version
  • 1.9.9
This record contains material that is subject to copyright

Copyright 2012-2026 Defiant Inc.
License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. License Detail.