Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-24230

Опубликовано: 12 апр. 2021
Источник: nvd
CVSS3: 8.1
CVSS2: 5.8
EPSS Низкий

Описание

The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:patreon:patreon_wordpress:*:*:*:*:*:wordpress:*:*
Версия до 1.7.0 (исключая)

EPSS

Процентиль: 31%
0.0012
Низкий

8.1 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-352
CWE-352

Связанные уязвимости

github
больше 3 лет назад

The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.

EPSS

Процентиль: 31%
0.0012
Низкий

8.1 High

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-352
CWE-352