Incorrect Authorization vulnerability in WPChill Htaccess File Editor Allows Accessing Functionality Not Properly Constrained by ACLs
CVE-2024-49256
8.8HIGH
Summary
An incorrect authorization vulnerability in the WPChill Htaccess File Editor has been identified, which allows access to functionalities that are not properly constrained by access control lists (ACLs). This flaw enables unauthorized users to potentially manipulate sensitive server configurations, posing a risk to the security and integrity of the affected WordPress installations. The vulnerability affects versions from n/a through 1.0.18, emphasizing the need for administrators to promptly assess their systems and ensure proper access controls are implemented.
Affected Version(s)
Htaccess File Editor <= 1.0.18
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
savphill (Patchstack Alliance)