The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.
History

Mon, 07 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:wordpress:*:*

Tue, 01 Oct 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Coderevolution
Coderevolution echo Rss Feed Post Generator
CPEs cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:*:*:*
Vendors & Products Coderevolution
Coderevolution echo Rss Feed Post Generator
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 01 Oct 2024 08:45:00 +0000

Type Values Removed Values Added
Description The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.
Title Echo RSS Feed Post Generator <= 5.4.6 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-01T08:30:18.477Z

Updated: 2024-10-01T13:31:58.423Z

Reserved: 2024-09-26T20:30:45.737Z

Link: CVE-2024-9265

cve-icon Vulnrichment

Updated: 2024-10-01T13:31:52.874Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-01T09:15:08.810

Modified: 2024-10-07T18:48:15.380

Link: CVE-2024-9265

cve-icon Redhat

No data.