The Webo-facto plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.40 due to insufficient restriction on the 'doSsoAuthentification' function. This makes it possible for unauthenticated attackers to make themselves administrators by registering with a username that contains '-wfuser'.
References
Configurations
History
25 Sep 2024, 17:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:medialibs:webo-facto:*:*:*:*:*:wordpress:*:* | |
First Time |
Medialibs
Medialibs webo-facto |
|
CWE | NVD-CWE-noinfo | |
References | () https://plugins.trac.wordpress.org/browser/webo-facto-connector/tags/1.40/WeboFacto/Sso.php#L78 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3153062/webo-facto-connector - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/c1280ceb-9ce8-47fc-8fd3-6af80015dea9?source=cve - Third Party Advisory |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
20 Sep 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-20 08:15
Updated : 2024-09-25 17:49
NVD link : CVE-2024-8853
Mitre link : CVE-2024-8853
CVE.ORG link : CVE-2024-8853
JSON object : View
Products Affected
medialibs
- webo-facto
CWE