The Accordion plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'accordions_duplicate_post_as_draft' function in all versions up to, and including, 2.2.96. This makes it possible for authenticated attackers, with contributor access and above, to duplicate arbitrary posts, allowing access to the contents of password-protected posts.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-17379 The Accordion plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'accordions_duplicate_post_as_draft' function in all versions up to, and including, 2.2.96. This makes it possible for authenticated attackers, with contributor access and above, to duplicate arbitrary posts, allowing access to the contents of password-protected posts.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T18:48:21.807Z

Reserved: 2024-02-19T20:15:43.992Z

Link: CVE-2024-1641

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:21.807Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-09T19:15:18.917

Modified: 2024-11-21T08:50:59.157

Link: CVE-2024-1641

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T22:10:00Z