Vulnerability Report
Plugin Critical Patch path listed CVE-2026-7567

Temporary Login <= 1.0.0 - Authentication Bypass to Account Takeover

The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-login-token' GET parameter is a scalar string before processing it. When the parameter is supplied as an array, PHP's empty() check is bypassed and sanitize_key() returns an empty string, which is then passed as the meta_value to get_users(). WordPress ignores an empty meta_value and returns all users matching the meta_key '_temporary_login_token', allowing authentication without a valid token. This makes it possible for unauthenticated attackers to authenticate as any active temporary login user by sending a single crafted GET request.

Quick Answer

CVE-2026-7567 is a critical severity with CVSS 9.8 Vulnerability issue affecting the Plugin Temporary Login. It affects Versions up to 1.0.0 and is fixed in 1.1.0.

Published
Apr 30, 2026
Last Updated
Apr 30, 2026
Slug
temporary-login
Operational Summary

What the operator needs to know

Patch Status
Patched release is available
Remediation
Update to version 1.1.0, or a newer patched version
Operator Briefing

CVE-2026-7567 is tracked for the Plugin Temporary Login as critical severity with CVSS 9.8. The affected range is Versions up to 1.0.0. Update Temporary Login to 1.1.0 or newer where that version is compatible with the site.

Issue Type
Vulnerability
Primary Fixed Version
1.1.0
Primary Affected Range
Versions up to 1.0.0
Tracking ID
CVE-2026-7567
Detailed Metadata
Software Type Plugin
Software Slug
temporary-login View on wordpress.org
CVE CVE-2026-7567
Patched Versions
1.1.0
Affected Versions
Versions up to 1.0.0
Licensing Notices

This record contains material that is subject to copyright

DEFIANT
Copyright 2012-2026 Defiant Inc.

License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more

MITRE
Copyright 1999-2026 The MITRE Corporation

License: CVE Usage: MITRE hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute Common Vulnerabilities and Exposures (CVE®). Any copy you make for such purposes is authorized provided that you reproduce MITRE's copyright designation and this license in any such copy. Read more