The Word Replacer Pro plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the word_replacer_ultra() function in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to update arbitrary content on the affected WordPress site.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-17461 | The Word Replacer Pro plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the word_replacer_ultra() function in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to update arbitrary content on the affected WordPress site. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 18 Apr 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Charlestsmith
Charlestsmith word Replacer Pro |
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:charlestsmith:word_replacer_pro:1.0:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Charlestsmith
Charlestsmith word Replacer Pro |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-21T23:11:12.441Z
Reserved: 2024-02-22T01:44:08.797Z
Link: CVE-2024-1733
Updated: 2024-08-01T18:48:22.009Z
Status : Analyzed
Published: 2024-03-16T06:15:13.010
Modified: 2025-04-18T15:32:56.347
Link: CVE-2024-1733
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD