LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-2144 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: February 14, 2026

Magic Login Mail or QR Code WordPress Plugin - Privilege Escalation

Published: February 14, 2026Updated: February 14, 2026PoC AvailableRemote Exploitable

Overview

Magic Login Mail or QR Code WordPress plugin <= 2.05 contains a privilege escalation caused by predictable QR code filename and race condition in uploads directory, letting unauthenticated attackers gain unauthorized user access, exploit requires triggering login link request.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 5.2%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can gain unauthorized access to any user account, including administrators, via race condition exploitation.

Mitigation

Update to a version later than 2.05 or the latest available version.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 14, 2026

🟠 CVE-2026-2144 - High (8.1) The Magic Login Mail or QR Code plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.05. This is due to the plugin storing the magic login QR code image with a predictable, static filename (QR_Code.png... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-2144/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-2144
Severity
High
CVSS Score
8.1
Type
broken_access_control
Status
new
EPSS
5.2%
Social Posts
1

CWE

  • CWE-269

CVSS Metrics

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

5.2%Probability of exploitation in the next 30 days