All the vulnerabilites related to ithemelandco - Bulk Posts Editing For WordPress
cve-2024-4199
Vulnerability from cvelistv5
Published
2024-05-15 01:56
Modified
2024-08-01 20:33
Severity ?
EPSS score ?
Summary
Bulk Posts Editing For WordPress <= 4.2.3 - Authenticated (Subscriber+) Missing Authorization
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ithemelandco | Bulk Posts Editing For WordPress |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4199", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T16:03:45.526732Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:54:48.335Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:33:52.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/683131a0-eec3-4251-b322-5c2088855687?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026new=3085134%40ithemeland-bulk-posts-editing-lite%2Ftrunk\u0026old=2946926%40ithemeland-bulk-posts-editing-lite%2Ftrunk\u0026sfp_email=\u0026sfph_mail=" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Bulk Posts Editing For WordPress", "vendor": "ithemelandco", "versions": [ { "lessThanOrEqual": "4.2.3", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Benedictus Jovan" } ], "descriptions": [ { "lang": "en", "value": "The Bulk Posts Editing For WordPress plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on the plugin\u0027s AJAX actions in all versions up to, and including, 4.2.3. This makes it possible for authenticated attackers, with subscriber access and higher, to invoke their corresponding functions. This may lead to post creation and duplication, post content retrieval, post taxonomy manipulation." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-862 Missing Authorization", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T01:56:54.769Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/683131a0-eec3-4251-b322-5c2088855687?source=cve" }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026new=3085134%40ithemeland-bulk-posts-editing-lite%2Ftrunk\u0026old=2946926%40ithemeland-bulk-posts-editing-lite%2Ftrunk\u0026sfp_email=\u0026sfph_mail=" } ], "timeline": [ { "lang": "en", "time": "2024-05-14T12:16:49.000+00:00", "value": "Disclosed" } ], "title": "Bulk Posts Editing For WordPress \u003c= 4.2.3 - Authenticated (Subscriber+) Missing Authorization" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-4199", "datePublished": "2024-05-15T01:56:54.769Z", "dateReserved": "2024-04-25T16:45:47.251Z", "dateUpdated": "2024-08-01T20:33:52.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-4204
Vulnerability from cvelistv5
Published
2024-05-16 20:31
Modified
2024-08-01 20:33
Severity ?
EPSS score ?
Summary
Bulk Posts Editing For WordPress <= 4.2.3 - Cross-Site Request Forgery
References
Impacted products
▼ | Vendor | Product |
---|---|---|
ithemelandco | Bulk Posts Editing For WordPress |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-4204", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T18:27:30.451676Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T18:27:37.378Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:33:52.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/34b39462-32c5-4f7d-b54f-d95f40b6ed92?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026new=3085134%40ithemeland-bulk-posts-editing-lite%2Ftrunk\u0026old=2946926%40ithemeland-bulk-posts-editing-lite%2Ftrunk\u0026sfp_email=\u0026sfph_mail=#file51" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Bulk Posts Editing For WordPress", "vendor": "ithemelandco", "versions": [ { "lessThanOrEqual": "4.2.3", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Benedictus Jovan" } ], "descriptions": [ { "lang": "en", "value": "The Bulk Posts Editing For WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.3. This is due to missing or incorrect nonce validation on the plugin\u0027s AJAX actions.. This makes it possible for unauthenticated attackers to create and duplicate posts, retrieve post content, and modify post taxonomy among other things via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-16T20:31:03.725Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/34b39462-32c5-4f7d-b54f-d95f40b6ed92?source=cve" }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026new=3085134%40ithemeland-bulk-posts-editing-lite%2Ftrunk\u0026old=2946926%40ithemeland-bulk-posts-editing-lite%2Ftrunk\u0026sfp_email=\u0026sfph_mail=#file51" } ], "timeline": [ { "lang": "en", "time": "2024-05-16T07:33:30.000+00:00", "value": "Disclosed" } ], "title": "Bulk Posts Editing For WordPress \u003c= 4.2.3 - Cross-Site Request Forgery" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-4204", "datePublished": "2024-05-16T20:31:03.725Z", "dateReserved": "2024-04-25T17:13:06.405Z", "dateUpdated": "2024-08-01T20:33:52.947Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }