WordPress WpTravelly plugin <= 1.7.7 - Broken Access Control vulnerability
CVE-2024-43212
7.5HIGH
Summary
A vulnerability has been identified in the WpTravelly plugin developed by MagePeople, leading to improper access control due to missing authorization checks. This issue allows users to exploit functionality that should have been constrained by Access Control Lists (ACLs), potentially compromising sensitive operations within the plugin. The vulnerability affects all versions of WpTravelly prior to and including 1.7.7, necessitating urgent attention from site administrators to ensure appropriate security measures are enforced.
Affected Version(s)
WpTravelly <= 1.7.7
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Majed Refaea (Patchstack Alliance)