2024-06-08 06:03:10 +00:00
{
"id" : "CVE-2024-5770" ,
"sourceIdentifier" : "security@wordfence.com" ,
"published" : "2024-06-08T05:15:40.320" ,
2024-06-10 04:03:18 +00:00
"lastModified" : "2024-06-10T02:52:08.267" ,
"vulnStatus" : "Awaiting Analysis" ,
2024-06-08 06:03:10 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The WP Force SSL & HTTPS SSL Redirect plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_save_setting' function in versions up to, and including, 1.66. This makes it possible for authenticated attackers, subscriber-level permissions and above, to update the plugin settings."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security@wordfence.com" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 4.2 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.6 ,
"impactScore" : 2.5
}
]
} ,
"references" : [
{
"url" : "https://plugins.trac.wordpress.org/browser/wp-force-ssl/tags/1.66/wp-force-ssl.php#L953" ,
"source" : "security@wordfence.com"
} ,
{
"url" : "https://plugins.trac.wordpress.org/changeset/3099110/" ,
"source" : "security@wordfence.com"
} ,
{
"url" : "https://swisskyrepo.github.io/PayloadsAllTheThings/CRLF%20Injection/" ,
"source" : "security@wordfence.com"
} ,
{
"url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2081e4a-c6b7-4730-be59-bc728b90ecaa?source=cve" ,
"source" : "security@wordfence.com"
}
]
}