cve/2021/CVE-2021-24359.md
2024-06-18 02:51:15 +02:00

18 lines
1.0 KiB
Markdown

### [CVE-2021-24359](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24359)
![](https://img.shields.io/static/v1?label=Product&message=The%20Plus%20Addons%20for%20Elementor%20Page%20Builder&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=4.1.11%3C%204.1.11%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284%20Improper%20Access%20Control&color=brighgreen)
### Description
The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.11 did not properly check that a user requesting a password reset was the legitimate user, allowing an attacker to send an arbitrary reset password email to a registered user on behalf of the WordPress site. Such issue could be chained with an open redirect (CVE-2021-24358) in version below 4.1.10, to include a crafted password reset link in the email, which would lead to an account takeover.
### POC
#### Reference
- https://wpscan.com/vulnerability/486b82d1-30d4-44d2-9542-f33e3f149e92
#### Github
No PoCs found on GitHub currently.