Unauthorized Access to Arbitrary Files on Windows and Linux Servers via Missing Capability Check in InPost for WooCommerce Plugin
CVE-2024-6500

10CRITICAL

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
17 August 2024

Badges

📰 News Worthy

Summary

The InPost for WooCommerce plugin and InPost PL plugin for WordPress are vulnerable to unauthorized access and deletion of data, making it possible for attackers to read and delete arbitrary files on Windows servers. On Linux servers, only files within the WordPress install will be deleted, but all files can be read. The impact of successful exploitation can lead to the forced setup state of a website, allowing it to be connected to harmful databases and potentially leading to further system compromise. InPost PL users are recommended to apply the latest patch, while InPost for WooCommerce plugin users are encouraged to switch to InPost PL and remove the vulnerable plugin. No known exploitation by ransomware groups has been reported.

News Articles

WordPressの人気プラグインに重大な欠陥、1万超のWebサイトに攻撃リスク(CVE-2024-6500) | Codebook|Security News

WordPressの人気プラグインInPostシリーズに重大な欠陥が判明、1万超のWebサイトが攻撃リスクにさらされる(CVE-2024-6500)|OpenAI、米国大統領選挙を狙ったイランの影響力行使オペレーションを阻止

5 months ago

References

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 📰

    First article discovered by 株式会社マキナレコード

  • Vulnerability published

.