5.3
CVE-2024-12472
- EPSS 0.38%
- Veröffentlicht 11.01.2025 03:15:21
- Zuletzt bearbeitet 05.06.2025 15:20:02
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Post Duplicator <= 2.36 - Authenticated (Contributor+) Protected Post Disclosure
The Post Duplicator plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the mtphr_duplicate_post() due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to by duplicating the post.
Mögliche Gegenmaßnahme
Post Duplicator: Update to version 2.37, or a newer patched version
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Post Duplicator
Version
*-2.36
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Metaphorcreations ≫ Post Duplicator SwPlatformwordpress Version < 2.37
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.38% | 0.592 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.