2024-02-07 13:01:09 +00:00
{
"id" : "CVE-2024-1110" ,
"sourceIdentifier" : "security@wordfence.com" ,
"published" : "2024-02-07T11:15:09.040" ,
2024-02-10 05:00:28 +00:00
"lastModified" : "2024-02-10T04:13:13.260" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-02-07 13:01:09 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The Podlove Podcast Publisher plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the init() function in all versions up to, and including, 4.0.11. This makes it possible for unauthenticated attackers to import the plugin's settings."
2024-02-10 05:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "El complemento Podlove Podcast Publisher para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n init() en todas las versiones hasta la 4.0.11 incluida. Esto hace posible que atacantes no autenticados importen la configuraci\u00f3n del complemento."
2024-02-07 13:01:09 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-02-10 05:00:28 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
} ,
2024-02-07 13:01:09 +00:00
{
"source" : "security@wordfence.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
}
]
} ,
2024-02-10 05:00:28 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-862"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*" ,
"versionEndIncluding" : "4.0.11" ,
"matchCriteriaId" : "E302ED2F-F761-4E98-BC91-B001D42F9021"
}
]
}
]
}
] ,
2024-02-07 13:01:09 +00:00
"references" : [
{
"url" : "https://github.com/podlove/podlove-publisher/commit/7873ff520631087e2f10737860cdcd64d53187ba" ,
2024-02-10 05:00:28 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Patch"
]
2024-02-07 13:01:09 +00:00
} ,
{
"url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3032008%40podlove-podcasting-plugin-for-wordpress&new=3032008%40podlove-podcasting-plugin-for-wordpress&sfp_email=&sfph_mail=" ,
2024-02-10 05:00:28 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Patch"
]
2024-02-07 13:01:09 +00:00
} ,
{
"url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c9cf461-572c-4be8-96e6-659acf3208f3?source=cve" ,
2024-02-10 05:00:28 +00:00
"source" : "security@wordfence.com" ,
"tags" : [
"Third Party Advisory"
]
2024-02-07 13:01:09 +00:00
}
]
}