The Mega Addons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the vc_saving_data function in versions up to, and including, 4.2.7. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin's settings.
References
Link | Resource |
---|---|
https://www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-9748-5359efd51754 | Third Party Advisory |
https://plugins.trac.wordpress.org/browser/mega-addons-for-visual-composer/tags/4.2.7/main.php#L87 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-12-14 13:15
Updated : 2022-12-20 06:26
NVD link : CVE-2022-4501
Mitre link : CVE-2022-4501
JSON object : View
CWE
CWE-862
Missing Authorization
Products Affected
topdigitaltrends
- mega_addons_for_wpbakery_page_builder