WordPress External Database Based Actions Plugin Authentication Bypass Vulnerability
CVE-2024-10311 Published on November 15, 2024

External Database Based Actions <= 0.1 - Authenticated (Subscriber+) Authentication Bypass
The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin settings and log in as any existing user on the site, such as an administrator.

NVD

Timeline

Discovered

Vendor Notified

Disclosed 22 days later.

Weakness Type

Authentication Bypass Using an Alternate Path or Channel

A product requires authentication, but the product has an alternate path or channel that does not require authentication.


Products Associated with CVE-2024-10311

stack.watch emails you whenever new vulnerabilities are published in Cmorillas1 External Database Based Actions or WordPress External Database Based Actions. Just hit a watch button to start following.

 
 

Affected Versions

cmorillas1 External Database Based Actions: wordpress external_database_based_actions:

Exploit Probability

EPSS
0.09%
Percentile
25.18%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.