CVE-2021-24892

Insecure Direct Object Reference in edit function of Advanced Forms (Free & Pro) before 1.6.9 allows authenticated remote attacker to change arbitrary user's email address and request for reset password, which could lead to take over of WordPress's administrator account. To exploit this vulnerability, an attacker must register to obtain a valid WordPress's user and use such user to authenticate with WordPress in order to exploit the vulnerable edit function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:advanced_forms_project:advanced_forms:*:*:*:*:free:wordpress:*:*
cpe:2.3:a:advanced_forms_project:advanced_forms:*:*:*:*:pro:wordpress:*:*

History

21 Nov 2024, 05:53

Type Values Removed Values Added
References () https://github.com/advancedforms/advanced-forms/commit/2ce3ab6985c3a909eefb01c562995bc6a994d3a2 - Patch, Third Party Advisory () https://github.com/advancedforms/advanced-forms/commit/2ce3ab6985c3a909eefb01c562995bc6a994d3a2 - Patch, Third Party Advisory
References () https://wpscan.com/vulnerability/364b0843-a990-4204-848a-60c928cc5bc0 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/364b0843-a990-4204-848a-60c928cc5bc0 - Exploit, Third Party Advisory

Information

Published : 2021-11-23 20:15

Updated : 2024-11-21 05:53


NVD link : CVE-2021-24892

Mitre link : CVE-2021-24892

CVE.ORG link : CVE-2021-24892


JSON object : View

Products Affected

advanced_forms_project

  • advanced_forms
CWE
CWE-639

Authorization Bypass Through User-Controlled Key