4.3
CVE-2024-6799
- EPSS 0.25%
- Published 19.07.2024 08:15:03
- Last modified 21.11.2024 09:50:20
- Source security@wordfence.com
- Teams watchlist Login
- Open Login
The YITH Essential Kit for WooCommerce #1 plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'activate_module', 'deactivate_module', and 'install_module' functions in all versions up to, and including, 2.34.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install, activate, and deactivate plugins from a pre-defined list of available YITH plugins.
Data is provided by the National Vulnerability Database (NVD)
Yithemes ≫ Yith Essential Kit For Woocommerce SwPlatformwordpress Version < 2.35.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.25% | 0.486 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@wordfence.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
|
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.