The Temporary Login Without Password WordPress plugin before 1.7.1 does not have authorisation and CSRF checks when updating its settings, which could allows any logged-in users, such as subscribers to update them
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/15eed13f-3195-4f5d-8933-36695c830f4f | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/15eed13f-3195-4f5d-8933-36695c830f4f | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/15eed13f-3195-4f5d-8933-36695c830f4f - Exploit, Third Party Advisory |
Information
Published : 2021-12-13 11:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24836
Mitre link : CVE-2021-24836
CVE.ORG link : CVE-2021-24836
JSON object : View
Products Affected
storeapps
- temporary_login_without_password