The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Metrics
Affected Vendors & Products
References
History
Fri, 06 Dec 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Straightvisions
Straightvisions sv100 Companion |
|
CPEs | cpe:2.3:a:straightvisions:sv100_companion:*:*:*:*:*:*:*:* | |
Vendors & Products |
Straightvisions
Straightvisions sv100 Companion |
|
Metrics |
ssvc
|
Fri, 06 Dec 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The SV100 Companion plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the settings_import() function in all versions up to, and including, 2.0.02. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | |
Title | SV100 Companion <= 2.0.02 - Missing Authorization to Unuathenticated Arbitrary Options Update | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-12-06T08:24:57.390Z
Updated: 2024-12-06T17:14:38.060Z
Reserved: 2024-12-04T14:08:59.440Z
Link: CVE-2024-12155
Vulnrichment
Updated: 2024-12-06T17:13:37.028Z
NVD
Status : Received
Published: 2024-12-06T09:15:08.417
Modified: 2024-12-06T09:15:08.417
Link: CVE-2024-12155
Redhat
No data.