The Zotpress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Zotpress_process_accounts_AJAX function in all versions up to, and including, 7.3.12. This makes it possible for authenticated attackers, with Contributor-level access and above, to reset the plugin's settings.
References
Configurations
History
08 Nov 2024, 15:26
Type | Values Removed | Values Added |
---|---|---|
First Time |
Katieseaborn
Katieseaborn zotpress |
|
References | () https://plugins.trac.wordpress.org/browser/zotpress/trunk/lib/admin/admin.php#L40 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3153348/zotpress/trunk/lib/admin/admin.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/1f38676b-270f-4b0f-bc98-a14a26b86a50?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:katieseaborn:zotpress:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-862 |
05 Nov 2024, 16:04
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
05 Nov 2024, 10:21
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-05 10:21
Updated : 2024-11-08 15:26
NVD link : CVE-2024-7429
Mitre link : CVE-2024-7429
CVE.ORG link : CVE-2024-7429
JSON object : View
Products Affected
katieseaborn
- zotpress