Products
JSON API User plugin for WordPress
- up to 3.9.3
Source
security@wordfence.com
Tags
CVE-2024-6624 details
Published : July 11, 2024, 7:15 a.m.
Last Modified : July 11, 2024, 1:05 p.m.
Last Modified : July 11, 2024, 1:05 p.m.
Description
The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.8 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
9.8
Exploitability Score
3.9
Impact Score
5.9
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://plugins.trac.wordpress.org/browser/json-api-user/trunk/controllers/User.php#L187 | security@wordfence.com |
https://plugins.trac.wordpress.org/browser/json-api-user/trunk/controllers/User.php#L51 | security@wordfence.com |
https://plugins.trac.wordpress.org/changeset/3115185/ | security@wordfence.com |
https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a26f60-5912-4d4a-8ef8-e4357c1fb1ff?source=cve | security@wordfence.com |
This website uses the NVD API, but is not approved or certified by it.