The Easy Mega Menu Plugin for WordPress – ThemeHunk plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions hooked via AJAX in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform actions like updating plugin settings.
History

Tue, 17 Dec 2024 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Themehunk mega Menu
CPEs cpe:2.3:a:themehunk:easy_mega_menu_plugin:*:*:*:*:*:wordpress:*:* cpe:2.3:a:themehunk:mega_menu:*:*:*:*:*:wordpress:*:*
Vendors & Products Themehunk easy Mega Menu Plugin
Themehunk mega Menu

Wed, 02 Oct 2024 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Themehunk
Themehunk easy Mega Menu Plugin
CPEs cpe:2.3:a:themehunk:easy_mega_menu_plugin:*:*:*:*:*:wordpress:*:*
Vendors & Products Themehunk
Themehunk easy Mega Menu Plugin

Wed, 25 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
Description The Easy Mega Menu Plugin for WordPress – ThemeHunk plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions hooked via AJAX in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform actions like updating plugin settings.
Title Easy Mega Menu Plugin for WordPress – ThemeHunk <= 1.0.9 - Missing Authorization to Authenticated (Subscriber+) Settings Updates
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-09-25T02:05:23.562Z

Updated: 2024-09-25T13:30:29.959Z

Reserved: 2024-09-04T16:01:56.846Z

Link: CVE-2024-8434

cve-icon Vulnrichment

Updated: 2024-09-25T13:30:25.985Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-25T03:15:04.213

Modified: 2024-12-17T14:36:19.633

Link: CVE-2024-8434

cve-icon Redhat

No data.