The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.6. This is due to the plugin not properly validating a user's password reset code prior to updating their password. This makes it possible for unauthenticated attackers, with knowledge of a user's email address, to reset the user's password and gain access to their account.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/3192531/apppresser | Patch |
https://www.wordfence.com/threat-intel/vulnerabilities/id/43cb0399-4add-43d5-863c-30e11803bd90?source=cve | Third Party Advisory |
Configurations
History
05 Jun 2025, 17:01
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/changeset/3192531/apppresser - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/43cb0399-4add-43d5-863c-30e11803bd90?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:* | |
First Time |
Apppresser apppresser
Apppresser |
26 Nov 2024, 11:21
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-26 11:21
Updated : 2025-06-05 17:01
NVD link : CVE-2024-11024
Mitre link : CVE-2024-11024
CVE.ORG link : CVE-2024-11024
JSON object : View
Products Affected
apppresser
- apppresser
CWE
CWE-230
Improper Handling of Missing Values