CVE-2026-2144 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: February 14, 2026
Magic Login Mail or QR Code WordPress Plugin - Privilege Escalation
Overview
Magic Login Mail or QR Code WordPress plugin <= 2.05 contains a privilege escalation caused by predictable QR code filename and race condition in uploads directory, letting unauthenticated attackers gain unauthorized user access, exploit requires triggering login link request.
Severity & Score
Impact
Unauthenticated attackers can gain unauthorized access to any user account, including administrators, via race condition exploitation.
Mitigation
Update to a version later than 2.05 or the latest available version.
References
- https://plugins.trac.wordpress.org/browser/magic-login-mail/trunk/lib/class-magicloginmail.php#L250
- https://plugins.trac.wordpress.org/browser/magic-login-mail/trunk/lib/class-magicloginmail.php#L325
- https://www.wordfence.com/threat-intel/vulnerabilities/id/65066a17-653b-4444-9bd0-894ea8c1acb1?source=cve
Social Media Activity(1 post)
š CVE-2026-2144 - High (8.1) The Magic Login Mail or QR Code plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.05. This is due to the plugin storing the magic login QR code image with a predictable, static filename (QR_Code.png... š https://www.thehackerwire.com/vulnerability/CVE-2026-2144/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postGitHub Repositories(6 repos)
- https://github.com/you-ssef9/CVE-2026-21440
- https://github.com/chinaxploiter/CVE-2026-21445-PoC
- https://github.com/TibbersV6/CVE-2026-21440-POC-EXP
- https://github.com/jermaine22sei/CVE-2026-2144-exploit
- https://github.com/redpack-kr/Ashwesker-CVE-2026-21440
- https://github.com/k0nnect/cve-2026-21440-writeup-poc
Related Resources
Details
- CVE ID
- CVE-2026-2144
- Severity
- High
- CVSS Score
- 8.1
- Type
- broken_access_control
- Status
- new
- EPSS
- 5.2%
- Social Posts
- 1
CWE
- CWE-269
CVSS Metrics
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H