The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin settings and log in as any existing user on the site, such as an administrator.
Metrics
Affected Vendors & Products
References
History
Fri, 15 Nov 2024 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin settings and log in as any existing user on the site, such as an administrator. | |
Title | External Database Based Actions <= 0.1 - Authenticated (Subscriber+) Authentication Bypass | |
Weaknesses | CWE-288 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-15T09:29:40.406Z
Updated: 2024-11-15T09:29:40.406Z
Reserved: 2024-10-23T17:44:26.809Z
Link: CVE-2024-10311
Vulnrichment
No data.
NVD
Status : Awaiting Analysis
Published: 2024-11-15T10:15:03.980
Modified: 2024-11-15T13:58:08.913
Link: CVE-2024-10311
Redhat
No data.