CVE-2024-4611

The AppPresser plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'decrypt_value' and on the 'doCookieAuth' functions in all versions up to, and including, 4.3.2. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they previously used the login via the plugin API. This can only be exploited if the 'openssl' php extension is not loaded on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:*

History

05 Jun 2025, 20:48

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L133 - () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L133 - Product
References () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L167 - () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L167 - Product
References () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_User.php?rev=2789173#L40 - () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_User.php?rev=2789173#L40 - Product
References () https://plugins.trac.wordpress.org/changeset/3093975/apppresser - () https://plugins.trac.wordpress.org/changeset/3093975/apppresser - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/d1498fdf-9d5e-4277-92be-469d6646864b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/d1498fdf-9d5e-4277-92be-469d6646864b?source=cve - Third Party Advisory
CPE cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:*
CWE CWE-754
First Time Apppresser apppresser
Apppresser

21 Nov 2024, 09:43

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L133 - () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L133 -
References () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L167 - () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.php?rev=2456516#L167 -
References () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_User.php?rev=2789173#L40 - () https://plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_User.php?rev=2789173#L40 -
References () https://plugins.trac.wordpress.org/changeset/3093975/apppresser - () https://plugins.trac.wordpress.org/changeset/3093975/apppresser -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/d1498fdf-9d5e-4277-92be-469d6646864b?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/d1498fdf-9d5e-4277-92be-469d6646864b?source=cve -

29 May 2024, 13:02

Type Values Removed Values Added
Summary
  • (es) El complemento AppPresser para WordPress es vulnerable a un manejo inadecuado de excepciones de cifrado faltantes en las funciones 'decrypt_value' y 'doCookieAuth' en todas las versiones hasta la 4.3.2 incluida. Esto hace posible que atacantes no autenticados inicien sesión como cualquier usuario existente en el sitio, como un administrador, si previamente utilizaron el inicio de sesión a través de la API del complemento. Esto sólo puede explotarse si la extensión PHP 'openssl' no está cargada en el servidor.

29 May 2024, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-29 05:16

Updated : 2025-06-05 20:48


NVD link : CVE-2024-4611

Mitre link : CVE-2024-4611

CVE.ORG link : CVE-2024-4611


JSON object : View

Products Affected

apppresser

  • apppresser
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions