CVE-2026-2144

Magic Login · Magic Login Mail or QR Code

The Magic Login Mail or QR Code plugin for WordPress is vulnerable to privilege escalation, allowing attackers to gain unauthorized administrative access.

Executive summary

The Magic Login plugin contains a high-severity privilege escalation flaw that could allow users to bypass authentication and gain administrative control of the site.

Vulnerability

This plugin, designed to facilitate easier logins, contains a flaw in its authentication logic. Attackers can exploit this to elevate their privileges, potentially bypassing the "magic" link or QR code requirements to log in as an administrator.

Business impact

The ability to escalate privileges directly undermines the security model of the WordPress site. An attacker gaining administrative access can modify content, steal user data, or install malicious software. The CVSS score of 8.1 indicates a high level of risk to organizational security.

Remediation

Immediate Action: Update the Magic Login Mail or QR Code plugin to the latest version immediately. If no patch is available, consider disabling the plugin until one is released.

Proactive Monitoring: Review user login logs for any successful administrative logins that did not follow standard procedures or occurred at unusual times.

Compensating Controls: Enforce multi-factor authentication (MFA) through a separate, trusted security provider to provide a layer of protection even if the plugin's logic is bypassed.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Apply the necessary updates immediately. Because this plugin handles the authentication process, any vulnerability within it is critical. Organizations should evaluate if the convenience of "magic" logins outweighs the risk posed by such vulnerabilities.