The Radio Player plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_player function in versions up to, and including, 2.0.73. This makes it possible for unauthenticated attackers to update player instances.
References
Configurations
History
28 Aug 2024, 18:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:softlabbd:radio_player:*:*:*:*:*:wordpress:*:* | |
First Time |
Softlabbd radio Player
Softlabbd |
|
References | () https://plugins.svn.wordpress.org/radio-player/tags/2.0.7/readme.txt - Release Notes | |
References | () https://plugins.trac.wordpress.org/changeset/2942906/radio-player/trunk/includes/class-ajax.php - Patch | |
References | () https://plugins.trac.wordpress.org/changeset/3048105 - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/77409977-6822-4d14-9842-cb6a5aff2162?source=cve - Third Party Advisory |
19 Aug 2024, 13:00
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Aug 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-17 08:15
Updated : 2024-08-28 18:30
NVD link : CVE-2023-4025
Mitre link : CVE-2023-4025
CVE.ORG link : CVE-2023-4025
JSON object : View
Products Affected
softlabbd
- radio_player
CWE
CWE-862
Missing Authorization