The Webo-facto plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.40 due to insufficient restriction on the 'doSsoAuthentification' function. This makes it possible for unauthenticated attackers to make themselves administrators by registering with a username that contains '-wfuser'.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Sep 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:medialibs:webo-facto:*:*:*:*:*:wordpress:*:* |
Fri, 20 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Medialibs
Medialibs webo-facto |
|
CPEs | cpe:2.3:a:medialibs:webo-facto:*:*:*:*:*:*:*:* | |
Vendors & Products |
Medialibs
Medialibs webo-facto |
|
Metrics |
ssvc
|
Fri, 20 Sep 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Webo-facto plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.40 due to insufficient restriction on the 'doSsoAuthentification' function. This makes it possible for unauthenticated attackers to make themselves administrators by registering with a username that contains '-wfuser'. | |
Title | Webo-facto <= 1.40 - Unauthenticated Privilege Escalation | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-20T07:33:35.851Z
Updated: 2024-09-20T17:32:55.404Z
Reserved: 2024-09-13T18:40:57.970Z
Link: CVE-2024-8853
Vulnrichment
Updated: 2024-09-20T17:32:49.147Z
NVD
Status : Analyzed
Published: 2024-09-20T08:15:11.493
Modified: 2024-09-25T17:49:25.653
Link: CVE-2024-8853
Redhat
No data.