The Squaretype WordPress theme before 3.0.4 allows unauthenticated users to manipulate the query_vars used to retrieve the posts to display in one of its REST endpoint, without any validation. As a result, private and scheduled posts could be retrieved via a crafted request.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef | Exploit Third Party Advisory |
| https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://wpscan.com/vulnerability/971302fd-4e8b-4c6a-818f-3a42c7fb83ef - Exploit, Third Party Advisory |
13 Nov 2021, 04:03
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-11-08 18:15
Updated : 2024-11-21 05:53
NVD link : CVE-2021-24840
Mitre link : CVE-2021-24840
CVE.ORG link : CVE-2021-24840
JSON object : View
Products Affected
codesupply
- squaretype
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
