5.3
CVE-2024-3287
- EPSS 0.59%
- Published 02.05.2024 17:15:24
- Last modified 21.11.2024 09:29:19
- Source security@wordfence.com
- Teams watchlist Login
- Open Login
The SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer plugin for WordPress is vulnerable to unauthorized ld+json description injection due to a missing capability check on the save_settings function in all versions up to, and including, 3.10.2. This makes it possible for unauthenticated attackers to save schema types.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von Authorized Data Publishers (ADP) (Unstrukturiert)
Vendorwpmudev
≫
Product
smartcrawl
Default Statusunaffected
Version <=
3.10.2
Version
0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.59% | 0.681 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@wordfence.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|