Products
Uncanny Groups for LearnDash plugin for WordPress
- up to 6.1.0.1
Source
security@wordfence.com
Tags
CVE-2024-8350 details
Published : Sept. 25, 2024, 3:15 a.m.
Last Modified : Sept. 25, 2024, 3:15 a.m.
Last Modified : Sept. 25, 2024, 3:15 a.m.
Description
The Uncanny Groups for LearnDash plugin for WordPress is vulnerable to user group add due to a missing capability check on the /wp-json/ulgm_management/v1/add_user/ REST API endpoint in all versions up to, and including, 6.1.0.1. This makes it possible for authenticated attackers, with group leader-level access and above, to add users to their group which ultimately allows them to leverage CVE-2024-8349 and gain admin access to the site.
CVSS Score
1 | 2.7 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-862 | Missing Authorization | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
Base Score
2.7
Exploitability Score
1.2
Impact Score
1.4
Base Severity
LOW
Vector String : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
References
URL | Source |
---|---|
https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350 | security@wordfence.com |
https://www.wordfence.com/threat-intel/vulnerabilities/id/a38a58de-5f7d-4033-9a65-41b590b7d510?source=cve | security@wordfence.com |
This website uses the NVD API, but is not approved or certified by it.