Authentication Bypass Vulnerability Affects WordPress Plugin
CVE-2024-10311
8.8HIGH
Key Information
- Vendor
- Cmorillas1
- Status
- External Database Based Actions
- Vendor
- CVE Published:
- 15 November 2024
Summary
The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin settings and log in as any existing user on the site, such as an administrator.
Affected Version(s)
External Database Based Actions <= 0.1
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Disclosed
Vulnerability Reserved.
Discovered
Vendor Notified
Collectors
NVD DatabaseMitre Database
Credit
István Márton