### [CVE-2021-24238](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24238) ![](https://img.shields.io/static/v1?label=Product&message=Findeo&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Realteo&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.2.4%3C%201.2.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=1.3.1%3C%201.3.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%20Improper%20Access%20Control&color=brighgreen) ### Description The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter. ### POC #### Reference - https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5 #### Github No PoCs found on GitHub currently.