2024-12-15 03:03:56 +00:00

95 lines
3.5 KiB
JSON

{
"id": "CVE-2024-8791",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-24T03:15:03.547",
"lastModified": "2024-09-26T16:25:34.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Donation Forms by Charitable \u2013 Donations Plugin & Fundraising Platform for WordPress plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.8.1.14. This is due to the plugin not properly verifying a user's identity when the ID parameter is supplied through the update_core_user() function. This makes it possible for unauthenticated attackers to update the email address and password of arbitrary user accounts, including administrators, which can then be used to log in to those user accounts."
},
{
"lang": "es",
"value": "El complemento Donation Forms de Charitable \u2013 Donations Plugin & Fundraising Platform para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.8.1.14 incluida. Esto se debe a que el complemento no verifica correctamente la identidad de un usuario cuando se proporciona el par\u00e1metro ID a trav\u00e9s de la funci\u00f3n update_core_user(). Esto permite que atacantes no autenticados actualicen la direcci\u00f3n de correo electr\u00f3nico y la contrase\u00f1a de cuentas de usuario arbitrarias, incluidos los administradores, que luego se pueden usar para iniciar sesi\u00f3n en esas cuentas de usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpcharitable:charitable:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.8.1.15",
"matchCriteriaId": "439B094F-B8C8-4EFA-B250-D25F819E9357"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/charitable/tags/1.8.1.14/includes/users/class-charitable-user.php#L872",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3154009/charitable/trunk/includes/users/class-charitable-user.php",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0ee60943-b583-4a99-8e62-846b380c98aa?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}