Lucene search

K
cve[email protected]CVE-2024-4611
HistoryMay 29, 2024 - 5:16 a.m.

CVE-2024-4611

2024-05-2905:16:08
web.nvd.nist.gov
3
cve-2024-4611
nvd
vulnerability

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

27.0%

The AppPresser plugin for WordPress is vulnerable to improper missing encryption exception handling on the ‘decrypt_value’ and on the ‘doCookieAuth’ functions in all versions up to, and including, 4.3.2. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they previously used the login via the plugin API. This can only be exploited if the ‘openssl’ php extension is not loaded on the server.

Affected configurations

Vulners
Node
scottopolisapppresser_–_mobile_app_frameworkRange4.3.2

CNA Affected

[
  {
    "vendor": "scottopolis",
    "product": "AppPresser – Mobile App Framework",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "4.3.2",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

27.0%