2025-03-27 17:03:53 +00:00

64 lines
2.8 KiB
JSON

{
"id": "CVE-2024-13801",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-03-26T09:15:15.763",
"lastModified": "2025-03-27T16:45:46.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The BWL Advanced FAQ Manager plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'baf_set_notice_status' AJAX action in all versions up to, and including, 2.1.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to '1' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration."
},
{
"lang": "es",
"value": "El complemento BWL Advanced FAQ Manager para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos, lo que puede provocar una denegaci\u00f3n de servicio debido a la falta de una comprobaci\u00f3n de capacidad en la acci\u00f3n AJAX \u00abbaf_set_notice_status\u00bb en todas las versiones hasta la 2.1.4 incluida. Esto permite a atacantes autenticados, con acceso de suscriptor o superior, actualizar los valores de las opciones a \u00ab1\u00bb en el sitio de WordPress. Esto puede aprovecharse para actualizar una opci\u00f3n que generar\u00eda un error en el sitio y denegar\u00eda el servicio a usuarios leg\u00edtimos, o para establecer algunos valores como verdaderos, como el registro."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/bwl-advanced-faq-manager/5007135",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3a84201-6cd8-4528-ae7a-7fd813c8da18?source=cve",
"source": "security@wordfence.com"
}
]
}