CVE-2024-13740

The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.9.4.2 via the pm_messenger_show_messages function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read private conversations of other users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*

History

24 Feb 2025, 12:41

Type Values Removed Values Added
CPE cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/public/class-profile-magic-public.php#L1299 - () https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/public/class-profile-magic-public.php#L1299 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a1b1a4-df72-4666-b116-882af4cd5796?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a1b1a4-df72-4666-b116-882af4cd5796?source=cve - Third Party Advisory
First Time Metagauss
Metagauss profilegrid
Summary
  • (es) El complemento ProfileGrid – User Profiles, Groups and Communities para WordPress es vulnerable a la referencia de objetos directos inseguros en todas las versiones hasta 5.9.4.2 incluida, a través de la función PM_Messenger_Show_Messages debido a la validación faltante en una clave controlada por el usuario. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, lean conversaciones privadas de otros usuarios.

18 Feb 2025, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-18 03:15

Updated : 2025-02-24 12:41


NVD link : CVE-2024-13740

Mitre link : CVE-2024-13740

CVE.ORG link : CVE-2024-13740


JSON object : View

Products Affected

metagauss

  • profilegrid
CWE
CWE-639

Authorization Bypass Through User-Controlled Key