Data Modification Vulnerability in Single-user-chat Plugin for WordPress
CVE-2024-13646
8.1HIGH
Summary
The Single-user-chat plugin for WordPress has a vulnerability that permits authenticated attackers, including those with subscriber-level access, to modify data without proper validation. In particular, the 'single_user_chat_update_login' function allows for changes to option values, which could result in denial of service by creating errors on the site. Attackers could exploit this flaw to disrupt legitimate user access or make unauthorized changes to registration settings, thereby significantly affecting the site's functionality.
Affected Version(s)
Single-user-chat * <= 0.5
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Colin Xu