9.8
CVE-2024-9289
- EPSS 0.44%
- Veröffentlicht 01.10.2024 09:15:09
- Zuletzt bearbeitet 07.10.2024 18:25:21
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
WordPress & WooCommerce Affiliate Program <= 8.4.1 - Authentication Bypass to Account Takeover and Privilege Escalation
The WordPress & WooCommerce Affiliate Program plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 8.4.1. This is due to the rtwwwap_login_request_callback() function not properly validating a user's identity prior to authenticating them to the site. This makes it possible for unauthenticated attackers to log in as any user, including administrators, granted they have access to the administrator's email.
Mögliche Gegenmaßnahme
WordPress & WooCommerce Affiliate Program: Update to version 8.5.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WordPress & WooCommerce Affiliate Program
Version
*-8.4.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Redefiningtheweb ≫ Affiliate Pro SwPlatformwordpress Version < 8.5.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.44% | 0.627 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.