← Back to CVEs
CVE-2024-5770
MEDIUM4.2
Description
The WP Force SSL & HTTPS SSL Redirect plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_save_setting' function in versions up to, and including, 1.66. This makes it possible for authenticated attackers, subscriber-level permissions and above, to update the plugin settings.
CVE Details
CVSS v3.1 Score4.2
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published6/8/2024
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
webfactoryltd:wp_force_ssl
Weaknesses (CWE)
CWE-862
References
https://plugins.trac.wordpress.org/browser/wp-force-ssl/tags/1.66/wp-force-ssl.php#L953(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset/3099110/(security@wordfence.com)
https://swisskyrepo.github.io/PayloadsAllTheThings/CRLF%20Injection/(security@wordfence.com)
https://www.wordfence.com/threat-intel/vulnerabilities/id/c2081e4a-c6b7-4730-be59-bc728b90ecaa?source=cve(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/wp-force-ssl/tags/1.66/wp-force-ssl.php#L953(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/changeset/3099110/(af854a3a-2127-422b-91ae-364da2661108)
https://swisskyrepo.github.io/PayloadsAllTheThings/CRLF%20Injection/(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/threat-intel/vulnerabilities/id/c2081e4a-c6b7-4730-be59-bc728b90ecaa?source=cve(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.