cve/2024/CVE-2024-9926.md

19 lines
889 B
Markdown
Raw Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-9926](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9926)
![](https://img.shields.io/static/v1?label=Product&message=Jetpack&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=13.9%3C%2013.9.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863%20Incorrect%20Authorization&color=brighgreen)
### Description
The Jetpack WordPress plugin does not have proper authorisation in one of its REST endpoint, allowing any authenticated users, such as subscriber to read arbitrary feedbacks data sent via the Jetpack Contact Form
### POC
#### Reference
- https://wpscan.com/vulnerability/669382af-f836-4896-bdcb-5c6a57c99bd9/
#### Github
- https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-exploit
- https://github.com/m3ssap0/wordpress-jetpack-broken-access-control-vulnerable-application