The Essential Real Estate plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on several pages/post types in all versions up to, and including, 5.1.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to access invoices and transaction logs
Advisories
Source ID Title
EUVD EUVD EUVD-2024-50776 The Essential Real Estate plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on several pages/post types in all versions up to, and including, 5.1.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to access invoices and transaction logs
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 05 Jun 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared G5plus
G5plus essential Real Estate
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:g5plus:essential_real_estate:*:*:*:*:*:wordpress:*:*
Vendors & Products G5plus
G5plus essential Real Estate

Thu, 12 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Dec 2024 07:00:00 +0000

Type Values Removed Values Added
Description The Essential Real Estate plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on several pages/post types in all versions up to, and including, 5.1.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to access invoices and transaction logs
Title Essential Real Estate <= 5.1.6 - Missing Authorization to Authenticated (Contributor+) Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-12-12T14:46:16.727Z

Reserved: 2024-12-06T21:32:09.785Z

Link: CVE-2024-12329

cve-icon Vulnrichment

Updated: 2024-12-12T14:46:12.088Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-12T07:15:10.607

Modified: 2025-06-05T16:05:14.507

Link: CVE-2024-12329

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.