mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
52 lines
2.3 KiB
JSON
52 lines
2.3 KiB
JSON
{
|
|
"id": "CVE-2024-1042",
|
|
"sourceIdentifier": "security@wordfence.com",
|
|
"published": "2024-04-10T05:15:48.070",
|
|
"lastModified": "2024-04-10T13:23:38.787",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The WP Radio \u2013 Worldwide Online Radio Stations Directory for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 3.1.9. This makes it possible for authenticated attackers, with subscriber access and above, to import radio stations, remove countries, and modify the plugin's settings, which can lead to Cross-Site Scripting, tracked separately in CVE-2024-1041."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El complemento WP Radio \u2013 Worldwide Online Radio Stations Directory for WordPress para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en m\u00faltiples funciones AJAX en todas las versiones hasta la 3.1.9 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor y superior, importen estaciones de radio, eliminen pa\u00edses y modifiquen la configuraci\u00f3n del complemento, lo que puede conducir a Cross-Site Scripting, rastreado por separado en CVE-2024-1041."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "security@wordfence.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.4,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.1,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"references": [
|
|
{
|
|
"url": "https://wordpress.org/plugins/wp-radio/",
|
|
"source": "security@wordfence.com"
|
|
},
|
|
{
|
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b46e9771-37ff-4825-9af9-02ecde424653?source=cve",
|
|
"source": "security@wordfence.com"
|
|
}
|
|
]
|
|
} |