8.8
CVE-2024-12296
- EPSS 0.1%
- Published 12.02.2025 10:15:10
- Last modified 20.02.2025 16:09:14
- Source security@wordfence.com
- Teams watchlist Login
- Open Login
The Apus Framework plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'import_page_options' function in all versions up to, and including, 2.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Data is provided by the National Vulnerability Database (NVD)
Apusthemes ≫ Superio SwPlatformwordpress Version <= 2.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.1% | 0.276 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@wordfence.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.