CVE-2024-9265

The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.
Configurations

Configuration 1 (hide)

cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:wordpress:*:*

History

07 Oct 2024, 18:48

Type Values Removed Values Added
First Time Coderevolution
Coderevolution echo Rss Feed Post Generator
CPE cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:wordpress:*:*
CWE NVD-CWE-noinfo
References () https://codecanyon.net/item/echo-rss-feed-post-generator-plugin-for-wordpress/19486974 - () https://codecanyon.net/item/echo-rss-feed-post-generator-plugin-for-wordpress/19486974 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/c099f401-4b05-4532-8e31-af1b1dea7eca?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/c099f401-4b05-4532-8e31-af1b1dea7eca?source=cve - Third Party Advisory

04 Oct 2024, 13:51

Type Values Removed Values Added
Summary
  • (es) El complemento Echo RSS Feed Post Generator para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 5.4.6 incluida. Esto se debe a que el complemento no restringe adecuadamente los roles que se pueden establecer durante el registro a través de la función echo_check_post_header_sent(). Esto hace posible que atacantes no autenticados se registren como administradores.

01 Oct 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-01 09:15

Updated : 2024-10-07 18:48


NVD link : CVE-2024-9265

Mitre link : CVE-2024-9265

CVE.ORG link : CVE-2024-9265


JSON object : View

Products Affected

coderevolution

  • echo_rss_feed_post_generator
CWE
NVD-CWE-noinfo CWE-269

Improper Privilege Management