// For flags

CVE-2024-10078

WP Easy Post Types <= 1.4.4 - Authenticated (Subscriber+) Missing Authorization via Multiple Functions

Severity Score

7.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

The WP Easy Post Types plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 1.4.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete plugin options and posts.

El complemento WP Easy Post Types para WordPress es vulnerable al acceso no autorizado, la modificación y la pérdida de datos debido a la falta de una comprobación de capacidad en varias funciones en todas las versiones hasta la 1.4.4 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor o superior, agreguen, modifiquen o eliminen opciones y publicaciones del complemento.

*Credits: István Márton
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-10-17 CVE Reserved
  • 2024-10-17 CVE Published
  • 2024-10-23 EPSS Updated
  • 2024-10-24 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-862: Missing Authorization
CAPEC
References (25)
URL Tag Source
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L111
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L112
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L113
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L114
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L115
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L116
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L117
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L118
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L119
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L120
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L121
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L122
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L123
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L124
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L125
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L126
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L127
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L128
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L129
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L130
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L131
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L132
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L133
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L134
https://www.wordfence.com/threat-intel/vulnerabilities/id/d12c4b1c-23d0-430f-a6ea-0a3ab487ed10?source=cve
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Chertz
Search vendor "Chertz"
WP Easy Post Types
Search vendor "Chertz" for product "WP Easy Post Types"
<= 1.4.4
Search vendor "Chertz" for product "WP Easy Post Types" and version " <= 1.4.4"
en
Affected