The Passster WordPress plugin before 3.5.5.9 does not properly check for password, as well as that the post to be viewed is public, allowing unauthenticated users to bypass the protection offered by the plugin, and access arbitrary posts (such as private) content, by sending a specifically crafted request.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071 | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/0967303d-ea49-4993-84eb-a7ec97240071 - Exploit, Third Party Advisory | |
Summary |
|
26 Jun 2023, 17:47
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2023-01-23 15:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24881
Mitre link : CVE-2021-24881
CVE.ORG link : CVE-2021-24881
JSON object : View
Products Affected
passster_project
- passter
CWE