8.8
CVE-2024-8268
- EPSS 0.37%
- Veröffentlicht 10.09.2024 03:15:03
- Zuletzt bearbeitet 26.09.2024 16:15:31
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Frontend Dashboard <= 2.2.4 - Authenticated (Subscriber+) Arbitrary Function Call
The Frontend Dashboard plugin for WordPress is vulnerable to unauthorized code execution due to insufficient filtering on callable methods/functions via the ajax_request() function in all versions up to, and including, 2.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to call arbitrary functions that can be leverage for privilege escalation by changing user's passwords.
Mögliche Gegenmaßnahme
Frontend Dashboard: Update to version 2.2.5, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Frontend Dashboard
Version
*-2.2.4
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Buffercode ≫ Frontend Dashboard SwPlatformwordpress Version < 2.2.5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.37% | 0.58 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-94 Improper Control of Generation of Code ('Code Injection')
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.