Lucene search

K
cve[email protected]CVE-2024-5770
HistoryJun 08, 2024 - 5:15 a.m.

CVE-2024-5770

2024-06-0805:15:40
web.nvd.nist.gov
24
cve-2024-5770
wordpress
ssl
https
vulnerability
unauthorized modification
data
capability check
ajax_save_setting
authenticated attackers
subscriber-level permissions

4.2 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L

4.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.0%

The WP Force SSL & HTTPS SSL Redirect plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ‘ajax_save_setting’ function in versions up to, and including, 1.66. This makes it possible for authenticated attackers, subscriber-level permissions and above, to update the plugin settings.

Affected configurations

Vulners
Node
webfactorywp_force_ssl_\&_https_ssl_redirectRange1.66

CNA Affected

[
  {
    "vendor": "webfactory",
    "product": "WP Force SSL & HTTPS SSL Redirect",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.66",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

4.2 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L

4.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.0%