#VU98825 Missing Authorization in WP Easy Post Types - CVE-2024-10078
Published: October 18, 2024
Vulnerability identifier: #VU98825
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2024-10078
CWE-ID: CWE-862
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
WP Easy Post Types
WP Easy Post Types
Software vendor:
New Signature
New Signature
Description
The vulnerability allows a remote attacker to bypass authorization checks.
The vulnerability exists due to a missing capability check on multiple functions. A remote attacker can add, modify or delete plugin options and posts.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
External links
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d12c4b1c-23d0-430f-a6ea-0a3ab487ed10?source=cve
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L111
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L112
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L113
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L114
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L115
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L116
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L117
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L118
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L119
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L120
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L121
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L122
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L123
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L124
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L125
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L126
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L127
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L128
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L129
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L130
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L131
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L132
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L133
- https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L134