The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validation on the 'openid' user controlled key that determines what user will be updated. This makes it possible for unauthenticated attackers to update arbitrary user's accounts, including their email to a @weixin.com email, which can the be leveraged to reset the password of the user's account, including administrators.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Oct 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jianbo rest Api To Miniprogram
|
|
CPEs | cpe:2.3:a:jianbo:rest_api_to_miniprogram:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Jianbo rest Api To Miniprogram
|
Wed, 25 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jianbo
Jianbo rest-api-to-miniprogram |
|
CPEs | cpe:2.3:a:jianbo:rest-api-to-miniprogram:*:*:*:*:*:*:*:* | |
Vendors & Products |
Jianbo
Jianbo rest-api-to-miniprogram |
|
Metrics |
ssvc
|
Wed, 25 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validation on the 'openid' user controlled key that determines what user will be updated. This makes it possible for unauthenticated attackers to update arbitrary user's accounts, including their email to a @weixin.com email, which can the be leveraged to reset the password of the user's account, including administrators. | |
Title | REST API TO MiniProgram <= 4.7.1 - Unauthenticated Arbitrary User Email Update and Privilege Escalation via Account Takeover | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-25T02:05:21.738Z
Updated: 2024-09-25T13:24:46.812Z
Reserved: 2024-09-05T16:14:56.147Z
Link: CVE-2024-8485
Vulnrichment
Updated: 2024-09-25T13:24:42.401Z
NVD
Status : Analyzed
Published: 2024-09-25T03:15:05.190
Modified: 2024-10-02T16:19:15.993
Link: CVE-2024-8485
Redhat
No data.