CVE-2024-4199
Bulk Posts Editing For WordPress <= 4.2.3 - Authenticated (Subscriber+) Missing Authorization
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Bulk Posts Editing For WordPress plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 4.2.3. This makes it possible for authenticated attackers, with subscriber access and higher, to invoke their corresponding functions. This may lead to post creation and duplication, post content retrieval, post taxonomy manipulation.
El complemento Bulk Posts Editing For WordPress para WordPress es vulnerable al acceso no autorizado a la funcionalidad debido a una falta de verificación de capacidad en las acciones AJAX del complemento en todas las versiones hasta la 4.2.3 incluida. Esto hace posible que los atacantes autenticados, con acceso de suscriptor y superior, invoquen sus funciones correspondientes. Esto puede llevar a la creación y duplicación de publicaciones, recuperación de contenido de publicaciones y manipulación de taxonomía de publicaciones.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-04-25 CVE Reserved
- 2024-05-14 CVE Published
- 2024-08-01 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-862: Missing Authorization
CAPEC
References (2)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ithemelandco Search vendor "Ithemelandco" | Bulk Posts Editing For WordPress Search vendor "Ithemelandco" for product "Bulk Posts Editing For WordPress" | <= 4.2.3 Search vendor "Ithemelandco" for product "Bulk Posts Editing For WordPress" and version " <= 4.2.3" | en |
Affected
|