CVE-2022-3930
Directorist < 7.4.2.2 - Subscriber+ Arbitrary User Password Update via IDOR
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Directorist WordPress plugin before 7.4.2.2 suffers from an IDOR vulnerability which an attacker can exploit to change the password of arbitrary users instead of his own.
El complemento Directorist de WordPress anterior a 7.4.2.2 sufre una vulnerabilidad IDOR que un atacante puede aprovechar para cambiar la contraseƱa de usuarios arbitrarios en lugar de la suya propia.
The Directorist plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 7.4.2.1. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for subscriber-level attackers to change user passwords and potentially take over administrator accounts.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-11-10 CVE Reserved
- 2022-11-21 CVE Published
- 2024-08-03 CVE Updated
- 2024-08-03 First Exploit
- 2025-03-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-639: Authorization Bypass Through User-Controlled Key
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/8728d02a-51db-4447-a843-0264b6ceb413 | 2024-08-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wpwax Search vendor "Wpwax" | Directorist Search vendor "Wpwax" for product "Directorist" | < 7.4.2.2 Search vendor "Wpwax" for product "Directorist" and version " < 7.4.2.2" | wordpress |
Affected
|