The Login Lockdown – Protect Login Form plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the generate_export_file function in all versions up to, and including, 2.08. This makes it possible for authenticated attackers, with subscriber access and higher, to export this plugin's settings that include whitelisted IP addresses as well as a global unlock key. With the global unlock key an attacker can add their IP address to the whitelist.

Project Subscriptions

Vendors Products
Webfactoryltd Subscribe
Wp Login Lockdown Subscribe
Wordpress Subscribe
Wordpress Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2024-17097 The Login Lockdown – Protect Login Form plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the generate_export_file function in all versions up to, and including, 2.08. This makes it possible for authenticated attackers, with subscriber access and higher, to export this plugin's settings that include whitelisted IP addresses as well as a global unlock key. With the global unlock key an attacker can add their IP address to the whitelist.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Webfactoryltd
Webfactoryltd wp Login Lockdown
CPEs cpe:2.3:a:webfactoryltd:wp_login_lockdown:*:*:*:*:*:wordpress:*:*
Vendors & Products Webfactoryltd
Webfactoryltd wp Login Lockdown

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title Login Lockdown – Protect Login Form <= 2.08 - Missing Authorization
Weaknesses CWE-862

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.0013}

epss

{'score': 0.00177}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:45:38.586Z

Reserved: 2024-02-07T21:35:00.199Z

Link: CVE-2024-1340

cve-icon Vulnrichment

Updated: 2024-08-01T18:33:25.429Z

cve-icon NVD

Status : Modified

Published: 2024-02-29T01:43:48.777

Modified: 2026-04-08T18:20:34.330

Link: CVE-2024-1340

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:15:51Z

Weaknesses