The Squaretype WordPress theme before 3.0.4 allows unauthenticated users to manipulate the query_vars used to retrieve the posts to display in one of its REST endpoint, without any validation. As a result, private and scheduled posts could be retrieved via a crafted request.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef - Exploit, Third Party Advisory |
Information
Published : 2021-11-08 18:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24840
Mitre link : CVE-2021-24840
CVE.ORG link : CVE-2021-24840
JSON object : View
Products Affected
codesupply
- squaretype
CWE
CWE-639
Authorization Bypass Through User-Controlled Key