The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.
References
Configurations
Configuration 1 (hide)
|
History
07 Oct 2024, 18:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Coderevolution
Coderevolution echo Rss Feed Post Generator |
|
CPE | cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:wordpress:*:* | |
CWE | NVD-CWE-noinfo | |
References | () https://codecanyon.net/item/echo-rss-feed-post-generator-plugin-for-wordpress/19486974 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/c099f401-4b05-4532-8e31-af1b1dea7eca?source=cve - Third Party Advisory |
04 Oct 2024, 13:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Oct 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-01 09:15
Updated : 2024-10-07 18:48
NVD link : CVE-2024-9265
Mitre link : CVE-2024-9265
CVE.ORG link : CVE-2024-9265
JSON object : View
Products Affected
coderevolution
- echo_rss_feed_post_generator
CWE