The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.11 did not properly check that a user requesting a password reset was the legitimate user, allowing an attacker to send an arbitrary reset password email to a registered user on behalf of the WordPress site. Such issue could be chained with an open redirect (CVE-2021-24358) in version below 4.1.10, to include a crafted password reset link in the email, which would lead to an account takeover.
References
Link | Resource |
---|---|
https://theplusaddons.com/changelog/ | Release Notes Vendor Advisory |
https://wpscan.com/vulnerability/486b82d1-30d4-44d2-9542-f33e3f149e92 | Exploit Third Party Advisory |
https://theplusaddons.com/changelog/ | Release Notes Vendor Advisory |
https://wpscan.com/vulnerability/486b82d1-30d4-44d2-9542-f33e3f149e92 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://theplusaddons.com/changelog/ - Release Notes, Vendor Advisory | |
References | () https://wpscan.com/vulnerability/486b82d1-30d4-44d2-9542-f33e3f149e92 - Exploit, Third Party Advisory |
Information
Published : 2021-06-14 14:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24359
Mitre link : CVE-2021-24359
CVE.ORG link : CVE-2021-24359
JSON object : View
Products Affected
posimyth
- the_plus_addons_for_elementor