CVE-2024-6695

it's possible for an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions. This is due to improper logic flow on the user registration process.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:*

History

02 Jan 2026, 20:18

Type Values Removed Values Added
CWE CWE-863
First Time Cozmoslabs
Cozmoslabs profile Builder
CPE cpe:2.3:a:cozmoslabs:profile_builder:*:*:*:*:*:wordpress:*:*
References () https://wpscan.com/vulnerability/4afa5c85-ce27-4ca7-bba2-61fb39c53a5b/ - () https://wpscan.com/vulnerability/4afa5c85-ce27-4ca7-bba2-61fb39c53a5b/ - Exploit, Third Party Advisory

01 Aug 2024, 14:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

31 Jul 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Es posible que un atacante obtenga acceso administrativo sin tener ningún tipo de cuenta en el sitio objetivo y realice acciones no autorizadas. Esto se debe a un flujo lógico inadecuado en el proceso de registro de usuarios.

31 Jul 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 06:15

Updated : 2026-01-02 20:18


NVD link : CVE-2024-6695

Mitre link : CVE-2024-6695

CVE.ORG link : CVE-2024-6695


JSON object : View

Products Affected

cozmoslabs

  • profile_builder
CWE
CWE-863

Incorrect Authorization