Lucene search

K
cve[email protected]CVE-2024-3895
HistoryMay 02, 2024 - 5:15 p.m.

CVE-2024-3895

2024-05-0217:15:32
web.nvd.nist.gov
28
cve-2024-3895
missing capability check
unauthorized modification
data vulnerability
subscriber-level access
privilege escalation
partially patched
fully patched
nvd

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.1%

The WP Datepicker plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpdp_add_new_datepicker_ajax() function in all versions up to, and including, 2.1.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options that can be used for privilege escalation. This was partially patched in 2.0.9 and 2.1.0, and fully patched in 2.1.1.

Affected configurations

Vulners
Node
fahadmahmoodwp_datepickerRange2.1.0

CNA Affected

[
  {
    "vendor": "fahadmahmood",
    "product": "WP Datepicker",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "2.1.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

29.1%

Related for CVE-2024-3895