The LadiApp plugn for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the init_endpoint() function hooked via 'init' in versions up to, and including, 4.3. This makes it possible for unauthenticated attackers to modify a variety of settings. An attacker can directly modify the 'ladipage_key' which enables them to create new posts on the website and inject malicious web scripts.
History

Mon, 19 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Binhnguyenplus
Binhnguyenplus ladiapp
CPEs cpe:2.3:a:binhnguyenplus:ladiapp:*:*:*:*:*:*:*:*
Vendors & Products Binhnguyenplus
Binhnguyenplus ladiapp
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 17 Aug 2024 07:45:00 +0000

Type Values Removed Values Added
Description The LadiApp plugn for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the init_endpoint() function hooked via 'init' in versions up to, and including, 4.3. This makes it possible for unauthenticated attackers to modify a variety of settings. An attacker can directly modify the 'ladipage_key' which enables them to create new posts on the website and inject malicious web scripts.
Title LadiApp: Landing Page, PopupX, Marketing Automation, Affiliate Marketing… <= 4.3 - Missing Authorization via init_endpoint
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-08-17T07:34:23.344Z

Updated: 2024-08-19T17:39:25.220Z

Reserved: 2023-09-01T21:43:49.588Z

Link: CVE-2023-4730

cve-icon Vulnrichment

Updated: 2024-08-19T17:39:13.000Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-17T08:15:06.297

Modified: 2024-08-19T13:00:23.117

Link: CVE-2023-4730

cve-icon Redhat

No data.