CVE-2021-24881

The Passster WordPress plugin before 3.5.5.9 does not properly check for password, as well as that the post to be viewed is public, allowing unauthenticated users to bypass the protection offered by the plugin, and access arbitrary posts (such as private) content, by sending a specifically crafted request.
Configurations

Configuration 1 (hide)

cpe:2.3:a:passster_project:passter:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071 - Exploit, Third Party Advisory
Summary
  • (es) El complemento Passster de WordPress anterior a 3.5.5.9 no verifica correctamente la contraseña, ni tampoco que la publicación que se va a ver sea pública, lo que permite a los usuarios no autenticados omitir la protección ofrecida por el complemento y acceder a publicaciones arbitrarias (como contenido privado), enviando una solicitud específicamente manipulada.

26 Jun 2023, 17:47

Type Values Removed Values Added
CWE CWE-287 NVD-CWE-Other

Information

Published : 2023-01-23 15:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24881

Mitre link : CVE-2021-24881

CVE.ORG link : CVE-2021-24881


JSON object : View

Products Affected

passster_project

  • passter