Incorrect Authorization vulnerability in WPChill Htaccess File Editor Allows Accessing Functionality Not Properly Constrained by ACLs
CVE-2024-49256

8.8HIGH

Key Information:

Vendor
WordPress
Vendor
CVE Published:
1 November 2024

Summary

An incorrect authorization vulnerability in the WPChill Htaccess File Editor has been identified, which allows access to functionalities that are not properly constrained by access control lists (ACLs). This flaw enables unauthorized users to potentially manipulate sensitive server configurations, posing a risk to the security and integrity of the affected WordPress installations. The vulnerability affects versions from n/a through 1.0.18, emphasizing the need for administrators to promptly assess their systems and ensure proper access controls are implemented.

Affected Version(s)

Htaccess File Editor <= 1.0.18

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

savphill (Patchstack Alliance)
.