The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified.
History

Tue, 29 Oct 2024 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wpplugin:time_clock:*:*:*:*:-:wordpress:*:*
cpe:2.3:a:wpplugin:time_clock:*:*:*:*:pro:wordpress:*:*

Fri, 18 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpplugin
Wpplugin time Clock
Wpplugin time Clock Pro
CPEs cpe:2.3:a:wpplugin:time_clock:*:*:*:*:*:*:*:*
cpe:2.3:a:wpplugin:time_clock_pro:*:*:*:*:*:*:*:*
Vendors & Products Wpplugin
Wpplugin time Clock
Wpplugin time Clock Pro
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 18 Oct 2024 17:45:00 +0000

Type Values Removed Values Added
Description The Time Clock plugin and Time Clock Pro plugin for WordPress are vulnerable to Remote Code Execution in versions up to, and including, 1.2.2 (for Time Clock) and 1.1.4 (for Time Clock Pro) via the 'etimeclockwp_load_function_callback' function. This allows unauthenticated attackers to execute code on the server. The invoked function's parameters cannot be specified.
Title Time Clock <= 1.2.2 & Time Clock Pro <= 1.1.4 - Unauthenticated (Limited) Remote Code Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-18T17:32:30.648Z

Updated: 2024-10-18T18:56:31.697Z

Reserved: 2024-10-07T16:39:29.691Z

Link: CVE-2024-9593

cve-icon Vulnrichment

Updated: 2024-10-18T18:56:23.058Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-18T18:15:04.540

Modified: 2024-10-29T13:40:23.983

Link: CVE-2024-9593

cve-icon Redhat

No data.