Authenticated attackers can replace images uploaded by higher level users
CVE-2024-4873
4.3MEDIUM
Key Information
- Vendor
- AspengrovestudiOS
- Status
- Replace Image
- Vendor
- CVE Published:
- 19 June 2024
Summary
The Replace Image plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.1.10 via the image replacement functionality due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to replace images uploaded by higher level users such as admins.
Affected Version(s)
Replace Image <= 1.1.10
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Disclosed
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Jin Hao Chan