8.1
CVE-2024-13646
- EPSS 0.15%
- Veröffentlicht 30.01.2025 14:15:34
- Zuletzt bearbeitet 31.01.2025 18:19:45
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Single-user-chat <= 0.5 - Authenticated (Subscriber+) Limited Options Update
The Single-user-chat plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to insufficient validation on the 'single_user_chat_update_login' function in all versions up to, and including, 0.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to update option values to 'login' on the WordPress site. This may be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration.
Mögliche Gegenmaßnahme
Single-user-chat: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Single-user-chat
Version
* - 0.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Aakashbhagat ≫ Single User Chat SwPlatformwordpress Version <= 0.5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.15% | 0.356 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
|
| security@wordfence.com | 8.1 | 2.8 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
|
CWE-285 Improper Authorization
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.