CVE-2024-6799

The YITH Essential Kit for WooCommerce #1 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'activate_module', 'deactivate_module', and 'install_module' functions in all versions up to, and including, 2.34.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install, activate, and deactivate plugins from a pre-defined list of available YITH plugins.
Configurations

Configuration 1 (hide)

cpe:2.3:a:yithemes:yith_essential_kit_for_woocommerce:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 09:50

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L425 - Patch () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L425 - Patch
References () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L457 - Patch () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L457 - Patch
References () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L487 - Patch () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L487 - Patch
References () https://plugins.trac.wordpress.org/changeset/3120283/ - Product () https://plugins.trac.wordpress.org/changeset/3120283/ - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/ca497ffa-6306-46dc-895f-94f1d5236e28?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/ca497ffa-6306-46dc-895f-94f1d5236e28?source=cve - Third Party Advisory

10 Sep 2024, 15:05

Type Values Removed Values Added
Summary
  • (es) El complemento YITH Essential Kit para WooCommerce #1 para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificación de capacidad en las funciones 'activate_module', 'deactivate_module' e 'install_module' en todas las versiones hasta la 2.34.0 incluida. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, instalen, activen y desactiven complementos de una lista predefinida de complementos YITH disponibles.
CPE cpe:2.3:a:yithemes:yith_essential_kit_for_woocommerce:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L425 - () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L425 - Patch
References () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L457 - () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L457 - Patch
References () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L487 - () https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L487 - Patch
References () https://plugins.trac.wordpress.org/changeset/3120283/ - () https://plugins.trac.wordpress.org/changeset/3120283/ - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/ca497ffa-6306-46dc-895f-94f1d5236e28?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/ca497ffa-6306-46dc-895f-94f1d5236e28?source=cve - Third Party Advisory
First Time Yithemes
Yithemes yith Essential Kit For Woocommerce

19 Jul 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-19 08:15

Updated : 2024-11-21 09:50


NVD link : CVE-2024-6799

Mitre link : CVE-2024-6799

CVE.ORG link : CVE-2024-6799


JSON object : View

Products Affected

yithemes

  • yith_essential_kit_for_woocommerce
CWE
CWE-862

Missing Authorization