The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5 | Exploit Third Party Advisory |
https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/ | Release Notes Vendor Advisory |
https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Realteo-WordPress-Plugin-v1.2.3.txt | Exploit Third Party Advisory |
https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-04-22 14:15
Updated : 2022-07-29 09:33
NVD link : CVE-2021-24238
Mitre link : CVE-2021-24238
JSON object : View
CWE
CWE-425
Direct Request ('Forced Browsing')
Products Affected
purethemes
- realteo
- findeo