Show plain JSON{"id": "CVE-2021-24238", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2021-04-22T21:15:09.797", "references": [{"url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt", "source": "contact@wpscan.com"}, {"url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt", "source": "contact@wpscan.com"}, {"url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", "tags": ["Exploit", "Third Party Advisory"], "source": "contact@wpscan.com"}, {"url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", "tags": ["Release Notes", "Vendor Advisory"], "source": "contact@wpscan.com"}, {"url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", "tags": ["Exploit", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", "tags": ["Release Notes", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "contact@wpscan.com", "description": [{"lang": "en", "value": "CWE-284"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-425"}]}], "descriptions": [{"lang": "en", "value": "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter."}, {"lang": "es", "value": "El plugin Realteo WordPress versiones anteriores a 1.2.4, usado por Findeo Theme, no garantizaba que la propiedad solicitada a eliminar perteneciera al usuario que realizaba la petici\u00f3n, lo que permit\u00eda a cualquier usuario autenticado eliminar propiedades arbitrarias alterando el par\u00e1metro property_id"}], "lastModified": "2024-11-21T05:52:39.760", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:purethemes:findeo:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "156BF978-930B-4D4E-8F98-11D87C6EB2AF", "versionEndExcluding": "1.3.1"}, {"criteria": "cpe:2.3:a:purethemes:realteo:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "8682C4CD-462D-4C38-BCAC-A463C9FA5E14", "versionEndExcluding": "1.2.4"}], "operator": "OR"}]}], "sourceIdentifier": "contact@wpscan.com"}