Products
WP-DB-Table-Editor plugin for WordPress
- up to 1.8.4
Source
security@wordfence.com
Tags
CVE-2024-2019 details
Published : June 4, 2024, 6:15 a.m.
Last Modified : June 4, 2024, 4:57 p.m.
Last Modified : June 4, 2024, 4:57 p.m.
Description
The WP-DB-Table-Editor plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to lack of a default capability requirement on the 'dbte_render' function in all versions up to, and including, 1.8.4. This makes it possible for authenticated attackers, with contributor access and above, to modify database tables that the theme has been configured to use the plugin to edit.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7.5 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
7.5
Exploitability Score
Impact Score
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://plugins.trac.wordpress.org/browser/wp-db-table-editor/trunk/db-table-editor.php | security@wordfence.com |
https://www.wordfence.com/threat-intel/vulnerabilities/id/2d044e0a-a956-4319-985d-6a9a276daf49?source=cve | security@wordfence.com |
This website uses the NVD API, but is not approved or certified by it.