Lucene search

K
vulnrichmentPatchstackVULNRICHMENT:CVE-2024-34822
HistoryJun 11, 2024 - 3:26 p.m.

CVE-2024-34822 WordPress weMail plugin <= 1.14.2 - Broken Access Control vulnerability

2024-06-1115:26:25
CWE-862
Patchstack
github.com
wordpress
wemail plugin
broken access control
missing authorization
wedevs
cve-2024-34822

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Missing Authorization vulnerability in weDevs weMail.This issue affects weMail: from n/a through 1.14.2.

CNA Affected

[
  {
    "vendor": "weDevs",
    "product": "weMail",
    "versions": [
      {
        "status": "affected",
        "changes": [
          {
            "at": "1.14.3",
            "status": "unaffected"
          }
        ],
        "version": "n/a",
        "versionType": "custom",
        "lessThanOrEqual": "1.14.2"
      }
    ],
    "packageName": "wemail",
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected"
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-34822