CVE-2024-10078
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/10/2024
Last modified:
22/10/2024
Description
The WP Easy Post Types plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 1.4.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete plugin options and posts.
Impact
Base Score 3.x
5.40
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:newsignature:wp_easy_post_types:*:*:*:*:*:wordpress:*:* | 1.4.4 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L111
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L112
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L113
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L114
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L115
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L116
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L117
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L118
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L119
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L120
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L121
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L122
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L123
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L124
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L125
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L126
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L127
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L128
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L129
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L130
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L131
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L132
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L133
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L134
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d12c4b1c-23d0-430f-a6ea-0a3ab487ed10?source=cve



