Unauthorized modification of data possible in ShopLentor plugin due to missing capability check
CVE-2024-4566

7.1HIGH

Summary

The ShopLentor plugin for WordPress contains a significant vulnerability that allows unauthorized modification of data due to a crucial missing capability check in the ajax_dismiss function. This issue affects all versions up to and including 2.8.8. Authenticated attackers with contributor-level access or higher can exploit this vulnerability to set arbitrary WordPress options to 'true'. Furthermore, if the WooCommerce plugin is deactivated or the default WordPress admin dashboard is made accessible to authenticated users, even attackers with subscriber or customer-level access can leverage this security gap. As a result, this vulnerability poses a serious threat to the integrity of WordPress sites utilizing the ShopLentor plugin.

Affected Version(s)

ShopLentor – WooCommerce Builder for Elementor & Gutenberg +12 Modules – All in One Solution (formerly WooLentor) * <= 2.8.8

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

ali maher
.