CVE-2024-0791

CVSS 3.1 Score 4.3 of 10 (medium)

Details

Published Feb 5, 2024
Updated: Feb 13, 2024
CWE ID 862

Summary

CVE-2024-0791 is a vulnerability found in the WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress. This vulnerability affects all versions up to and including 1.0.8.1. It allows authenticated attackers with subscriber access or higher to create, delete, or modify taxonomy terms without proper authorization checks on the wpbe_create_new_term, wpbe_update_tax_term, and wpbe_delete_tax_term functions. The potential danger of this vulnerability is unauthorized access, modification, or loss of data. The affected products include tHubPC, tHubPD, tHubPB, ubC5mT, ubC5mU, tHubPG, ugUufN, tHubPH, tHubPE, tHubPF, tHubPK, tHubPL, tHubPI, tHubPJ, tHubPM, and tHubPN. To remediate this issue, users should update their plugin to a version that includes the fix for this vulnerability.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2024-0791 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions