The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Oct 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:wordpress:*:* |
Tue, 01 Oct 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Coderevolution
Coderevolution echo Rss Feed Post Generator |
|
CPEs | cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:*:*:* | |
Vendors & Products |
Coderevolution
Coderevolution echo Rss Feed Post Generator |
|
Metrics |
ssvc
|
Tue, 01 Oct 2024 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator. | |
Title | Echo RSS Feed Post Generator <= 5.4.6 - Unauthenticated Privilege Escalation | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-01T08:30:18.477Z
Updated: 2024-10-01T13:31:58.423Z
Reserved: 2024-09-26T20:30:45.737Z
Link: CVE-2024-9265
Vulnrichment
Updated: 2024-10-01T13:31:52.874Z
NVD
Status : Analyzed
Published: 2024-10-01T09:15:08.810
Modified: 2024-10-07T18:48:15.380
Link: CVE-2024-9265
Redhat
No data.