CVE-2024-5570
Simple Photoswipe <= 0.1 - Subscriber+ Arbitrary Settings Update
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The Simple Photoswipe WordPress plugin through 0.1 does not have authorisation check when updating its settings, which could allow any authenticated users, such as subscriber to update them
El complemento Simple Photoswipe de WordPress hasta la versión 0.1 no tiene verificación de autorización al actualizar su configuración, lo que podría permitir que cualquier usuario autenticado, como un suscriptor, los actualice.
The Simple Photoswipe plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the photoswipe_save functionability in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the plugin's settings.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-05-31 CVE Reserved
- 2024-06-07 CVE Published
- 2024-06-28 EPSS Updated
- 2024-08-01 CVE Updated
- 2024-08-01 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-862: Missing Authorization
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://wpscan.com/vulnerability/49b3a8cb-f606-4cf7-80ec-bfdafd74e848 | 2024-08-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Unknown Search vendor "Unknown" | Simple Photoswipe Search vendor "Unknown" for product "Simple Photoswipe" | <= 0.1 Search vendor "Unknown" for product "Simple Photoswipe" and version " <= 0.1" | en |
Affected
|