2024-07-14 02:06:08 +00:00

52 lines
2.2 KiB
JSON

{
"id": "CVE-2024-3915",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:42:34.610",
"lastModified": "2024-05-14T16:11:39.510",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Swift Framework plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the sf_edit_directory_item() function in all versions up to, and including, 2.7.31. This makes it possible for unauthenticated attackers to update arbitrary posts with arbitrary content. Unfortunately, we did not receive a response from the vendor to send over the vulnerability details."
},
{
"lang": "es",
"value": "El complemento Swift Framework para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n sf_edit_directory_item() en todas las versiones hasta la 2.7.31 incluida. Esto hace posible que atacantes no autenticados actualicen publicaciones arbitrarias con contenido arbitrario. Lamentablemente, no recibimos una respuesta del proveedor para enviarnos los detalles de la vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://swiftideas.com/swift-framework/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/855055d5-362e-4a92-9e9d-97eab328dcc3?source=cve",
"source": "security@wordfence.com"
}
]
}