CVE-2022-4501

The Mega Addons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the vc_saving_data function in versions up to, and including, 4.2.7. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin's settings.
Configurations

Configuration 1 (hide)

cpe:2.3:a:topdigitaltrends:mega_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 7.1
References () https://plugins.trac.wordpress.org/browser/mega-addons-for-visual-composer/tags/4.2.7/main.php#L87 - Patch, Third Party Advisory () https://plugins.trac.wordpress.org/browser/mega-addons-for-visual-composer/tags/4.2.7/main.php#L87 - Patch, Third Party Advisory
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-9748-5359efd51754 - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-9748-5359efd51754 - Third Party Advisory

07 Nov 2023, 03:58

Type Values Removed Values Added
CWE CWE-862

Information

Published : 2022-12-14 21:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4501

Mitre link : CVE-2022-4501

CVE.ORG link : CVE-2022-4501


JSON object : View

Products Affected

topdigitaltrends

  • mega_addons_for_wpbakery_page_builder
CWE

No CWE.