The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to privilege escalation/account takeover in all versions up to, and including, 16.26.8. This is due to to plugin not properly verifying a user's identity during new order creation. This makes it possible for unauthenticated attackers to supply any email through the user_email field and update the password for that user during new order creation. This requires the commerce addon to be enabled in order to exploit.
History

Thu, 12 Sep 2024 13:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:plechevandrey:wp-recall:*:*:*:*:*:wordpress:*:*

Fri, 06 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Plechevandrey
Plechevandrey wp-recall
CPEs cpe:2.3:a:plechevandrey:wp-recall:*:*:*:*:*:*:*:*
Vendors & Products Plechevandrey
Plechevandrey wp-recall
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 06 Sep 2024 07:00:00 +0000

Type Values Removed Values Added
Description The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to privilege escalation/account takeover in all versions up to, and including, 16.26.8. This is due to to plugin not properly verifying a user's identity during new order creation. This makes it possible for unauthenticated attackers to supply any email through the user_email field and update the password for that user during new order creation. This requires the commerce addon to be enabled in order to exploit.
Title WP-Recall – Registration, Profile, Commerce & More <= 16.26.8 - Insecure Direct Object Reference to Unauthenticated Arbitrary Password Update
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-09-06T06:50:52.522Z

Updated: 2024-09-06T13:31:51.951Z

Reserved: 2024-08-28T21:38:57.147Z

Link: CVE-2024-8292

cve-icon Vulnrichment

Updated: 2024-09-06T13:31:45.633Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-06T07:15:03.010

Modified: 2024-09-12T12:37:18.380

Link: CVE-2024-8292

cve-icon Redhat

No data.