The WP Force SSL & HTTPS SSL Redirect plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_save_setting' function in versions up to, and including, 1.66. This makes it possible for authenticated attackers, subscriber-level permissions and above, to update the plugin settings.
References
Configurations
History
21 Nov 2024, 09:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/wp-force-ssl/tags/1.66/wp-force-ssl.php#L953 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3099110/ - Patch | |
References | () https://swisskyrepo.github.io/PayloadsAllTheThings/CRLF%20Injection/ - Not Applicable | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/c2081e4a-c6b7-4730-be59-bc728b90ecaa?source=cve - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.2 |
01 Nov 2024, 14:02
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 | |
CPE | cpe:2.3:a:webfactoryltd:wp_force_ssl:*:*:*:*:free:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/wp-force-ssl/tags/1.66/wp-force-ssl.php#L953 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3099110/ - Patch | |
References | () https://swisskyrepo.github.io/PayloadsAllTheThings/CRLF%20Injection/ - Not Applicable | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/c2081e4a-c6b7-4730-be59-bc728b90ecaa?source=cve - Third Party Advisory | |
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
First Time |
Webfactoryltd wp Force Ssl
Webfactoryltd |
08 Jun 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-08 05:15
Updated : 2024-11-21 09:48
NVD link : CVE-2024-5770
Mitre link : CVE-2024-5770
CVE.ORG link : CVE-2024-5770
JSON object : View
Products Affected
webfactoryltd
- wp_force_ssl
CWE
CWE-862
Missing Authorization