Authorization Bypass in uListing Plugin for WordPress
CVE-2021-4339
7.5HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 7 June 2023
Summary
The uListing plugin for WordPress has a significant vulnerability that allows unauthorized users to bypass authorization checks. This flaw resides in the 'ulisting/includes/route.php' file specifically affecting the /1/api/ulisting-user/search REST-API route in all versions up to and including 1.6.6. As a result, malicious actors can exploit this vulnerability to access sensitive information, including a comprehensive list of users and their email addresses stored in the database, thereby compromising data privacy and security.
Affected Version(s)
Directory Listings WordPress plugin – uListing * < 1.7
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jerome Bruandet