WordPress External Database Based Actions Plugin Authentication Bypass Vulnerability
CVE-2024-10311 Published on November 15, 2024
External Database Based Actions <= 0.1 - Authenticated (Subscriber+) Authentication Bypass
The External Database Based Actions plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 0.1. This is due to a missing capability check in the 'edba_admin_handle' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin settings and log in as any existing user on the site, such as an administrator.
Timeline
Discovered
Vendor Notified
Disclosed 22 days later.
Weakness Type
Authentication Bypass Using an Alternate Path or Channel
A product requires authentication, but the product has an alternate path or channel that does not require authentication.
Products Associated with CVE-2024-10311
stack.watch emails you whenever new vulnerabilities are published in Cmorillas1 External Database Based Actions or WordPress External Database Based Actions. Just hit a watch button to start following.
Affected Versions
cmorillas1 External Database Based Actions:- Before and including 0.1 is affected.
- Before and including 0.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.