The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note that changing a WordPress user's password is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. Without this setting enabled, only the passwords of plugin customers, which are stored and managed in a separate database table, can be modified.
History

Wed, 09 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Latepoint
Latepoint latepoint
CPEs cpe:2.3:a:latepoint:latepoint:-:*:*:*:*:wordpress:*:*
Vendors & Products Latepoint
Latepoint latepoint
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 08:45:00 +0000

Type Values Removed Values Added
Description The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note that changing a WordPress user's password is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. Without this setting enabled, only the passwords of plugin customers, which are stored and managed in a separate database table, can be modified.
Title LatePoint <= 5.0.11 - Unauthenticated Arbitrary User Password Change via SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-08T08:33:18.169Z

Updated: 2024-10-09T15:49:45.921Z

Reserved: 2024-09-16T20:43:59.707Z

Link: CVE-2024-8911

cve-icon Vulnrichment

Updated: 2024-10-09T15:49:00.833Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-08T09:15:19.077

Modified: 2024-10-10T12:56:30.817

Link: CVE-2024-8911

cve-icon Redhat

No data.