The InPost for WooCommerce plugin and InPost PL plugin for WordPress are vulnerable to unauthorized access and deletion of data due to a missing capability check on the 'parse_request' function in all versions up to, and including, 1.4.0 (for InPost for WooCommerce) as well as 1.4.4 (for InPost PL). This makes it possible for unauthenticated attackers to read and delete arbitrary files on Windows servers. On Linux servers, only files within the WordPress install will be deleted, but all files can be read.
History

Tue, 20 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Inspirelabs
Inspirelabs inpost For Woocommerce
Inspirelabs inpost Pl
CPEs cpe:2.3:a:inspirelabs:inpost_for_woocommerce:*:*:*:*:*:*:*:*
cpe:2.3:a:inspirelabs:inpost_pl:*:*:*:*:*:*:*:*
Vendors & Products Inspirelabs
Inspirelabs inpost For Woocommerce
Inspirelabs inpost Pl
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 17 Aug 2024 02:45:00 +0000

Type Values Removed Values Added
Description The InPost for WooCommerce plugin and InPost PL plugin for WordPress are vulnerable to unauthorized access and deletion of data due to a missing capability check on the 'parse_request' function in all versions up to, and including, 1.4.0 (for InPost for WooCommerce) as well as 1.4.4 (for InPost PL). This makes it possible for unauthenticated attackers to read and delete arbitrary files on Windows servers. On Linux servers, only files within the WordPress install will be deleted, but all files can be read.
Title InPost for WooCommerce <= 1.4.0 and InPost PL <= 1.4.4 - Missing Authorization to Unauthenticated Arbitrary File Read and Delete
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-08-17T02:31:00.346Z

Updated: 2024-08-20T19:06:38.179Z

Reserved: 2024-07-04T00:24:13.965Z

Link: CVE-2024-6500

cve-icon Vulnrichment

Updated: 2024-08-20T19:06:32.537Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-17T03:15:10.983

Modified: 2024-08-19T13:00:23.117

Link: CVE-2024-6500

cve-icon Redhat

No data.