The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the delete_player function in versions up to, and including, 2.0.73. This makes it possible for unauthenticated attackers to delete player instances.
References
Configurations
History
28 Aug 2024, 18:32
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt - Release Notes | |
References | () https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/3048105 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/3f408f1f-207e-427a-a5d0-d0fadf453d7e?source=cve - Third Party Advisory | |
First Time |
Softlabbd
Softlabbd radio Player |
|
CPE | cpe:2.3:a:softlabbd:radio_player:*:*:*:*:*:wordpress:*:* |
19 Aug 2024, 13:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Aug 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-17 08:15
Updated : 2024-08-28 18:32
NVD link : CVE-2023-4024
Mitre link : CVE-2023-4024
CVE.ORG link : CVE-2023-4024
JSON object : View
Products Affected
softlabbd
- radio_player
CWE
CWE-862
Missing Authorization