The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validation on the 'openid' user controlled key that determines what user will be updated. This makes it possible for unauthenticated attackers to update arbitrary user's accounts, including their email to a @weixin.com email, which can the be leveraged to reset the password of the user's account, including administrators.
References
Configurations
History
02 Oct 2024, 16:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:jianbo:rest_api_to_miniprogram:*:*:*:*:*:wordpress:*:* | |
First Time |
Jianbo rest Api To Miniprogram
Jianbo |
|
References | () https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-weixin-controller.php#L264 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/b53066d3-2ff3-4460-896a-facd77455914?source=cve - Third Party Advisory |
26 Sep 2024, 13:32
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
25 Sep 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-25 03:15
Updated : 2024-10-02 16:19
NVD link : CVE-2024-8485
Mitre link : CVE-2024-8485
CVE.ORG link : CVE-2024-8485
JSON object : View
Products Affected
jianbo
- rest_api_to_miniprogram
CWE
CWE-639
Authorization Bypass Through User-Controlled Key