7.5

CVE-2021-24831

Exploit

Tab – Accordion, FAQ < 1.3.2 - Unauthenticated Arbitrary Tab Modification

All AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs.
Mögliche Gegenmaßnahme
Tab – Accordion, FAQ: Update to version 1.3.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Tab – Accordion, FAQ
Version [*, 1.3.2)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rich-webTab SwPlatformwordpress Version < 1.3.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.9% 0.749
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
CWE-425 Direct Request ('Forced Browsing')

The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.

CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.