The Webo-facto plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.40 due to insufficient restriction on the 'doSsoAuthentification' function. This makes it possible for unauthenticated attackers to make themselves administrators by registering with a username that contains '-wfuser'.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49436 | The Webo-facto plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.40 due to insufficient restriction on the 'doSsoAuthentification' function. This makes it possible for unauthenticated attackers to make themselves administrators by registering with a username that contains '-wfuser'. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 25 Sep 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:medialibs:webo-facto:*:*:*:*:*:wordpress:*:* |
Fri, 20 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Medialibs
Medialibs webo-facto |
|
| CPEs | cpe:2.3:a:medialibs:webo-facto:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Medialibs
Medialibs webo-facto |
|
| Metrics |
ssvc
|
Fri, 20 Sep 2024 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Webo-facto plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.40 due to insufficient restriction on the 'doSsoAuthentification' function. This makes it possible for unauthenticated attackers to make themselves administrators by registering with a username that contains '-wfuser'. | |
| Title | Webo-facto <= 1.40 - Unauthenticated Privilege Escalation | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-09-20T17:32:55.404Z
Reserved: 2024-09-13T18:40:57.970Z
Link: CVE-2024-8853
Updated: 2024-09-20T17:32:49.147Z
Status : Analyzed
Published: 2024-09-20T08:15:11.493
Modified: 2024-09-25T17:49:25.653
Link: CVE-2024-8853
No data.
OpenCVE Enrichment
No data.
EUVD