CVE-2024-10311
External Database Based Actions <= 0.1 - Authenticated (Subscriber+) Authentication Bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin settings and log in as any existing user on the site, such as an administrator.
El complemento External Database Based Actions para WordPress es vulnerable a la omisión de autenticación en versiones hasta la 0.1 incluida. Esto se debe a una comprobación de capacidad faltante en la función 'edba_admin_handle'. Esto permite que atacantes autenticados, con permisos de nivel de suscriptor y superiores, actualicen la configuración del complemento e inicien sesión como cualquier usuario existente en el sitio, como un administrador.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2024-10-23 CVE Reserved
- 2024-11-14 CVE Published
- 2024-11-15 CVE Updated
- ---------- EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
References (2)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cmorillas1 Search vendor "Cmorillas1" | External Database Based Actions Search vendor "Cmorillas1" for product "External Database Based Actions" | <= 0.1 Search vendor "Cmorillas1" for product "External Database Based Actions" and version " <= 0.1" | en |
Affected
|