2021-01-14 16:05:23 +00:00
{
2022-01-03 09:30:07 +01:00
"CVE_data_meta" : {
"ID" : "CVE-2021-24831" ,
"ASSIGNER" : "contact@wpscan.com" ,
"STATE" : "PUBLIC" ,
"TITLE" : "Tab - Accordion, FAQ < 1.3.2 - Unauthenticated AJAX Calls"
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"generator" : "WPScan CVE Generator" ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Unknown" ,
"product" : {
"product_data" : [
{
"product_name" : "Tab – Accordion, FAQ" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "1.3.2" ,
"version_value" : "1.3.2"
}
]
}
}
]
}
}
]
}
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "All AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs."
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"url" : "https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900" ,
"name" : "https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900"
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
2022-01-25 09:20:17 +01:00
"value" : "CWE-862 Missing Authorization" ,
2022-01-03 09:30:07 +01:00
"lang" : "eng"
}
2021-01-14 16:05:23 +00:00
]
2022-01-03 09:30:07 +01:00
}
]
} ,
"credit" : [
{
"lang" : "eng" ,
"value" : "Brandon Roldan"
2021-01-14 16:05:23 +00:00
}
2022-01-03 09:30:07 +01:00
] ,
"source" : {
"discovery" : "EXTERNAL"
}
2022-01-25 09:20:17 +01:00
}