CVE-2024-4874

The Bricks Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.8 via the postId parameter due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify posts and pages created by other users including admins. As a requirement for this, an admin would have to enable access to the editor specifically for such a user or enable it for all users with a certain user account type.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bricksbuilder:bricks:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 09:43

Type Values Removed Values Added
References () https://bricksbuilder.io/release/bricks-1-9-9/#access-control-fix-for-user-role-contributor - Release Notes () https://bricksbuilder.io/release/bricks-1-9-9/#access-control-fix-for-user-role-contributor - Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/6d63e898-43e5-42b5-96b6-1453352e0cae?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/6d63e898-43e5-42b5-96b6-1453352e0cae?source=cve - Third Party Advisory

24 Jun 2024, 19:41

Type Values Removed Values Added
First Time Bricksbuilder bricks
Bricksbuilder
References () https://bricksbuilder.io/release/bricks-1-9-9/#access-control-fix-for-user-role-contributor - () https://bricksbuilder.io/release/bricks-1-9-9/#access-control-fix-for-user-role-contributor - Release Notes
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/6d63e898-43e5-42b5-96b6-1453352e0cae?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/6d63e898-43e5-42b5-96b6-1453352e0cae?source=cve - Third Party Advisory
CWE CWE-639
CPE cpe:2.3:a:bricksbuilder:bricks:*:*:*:*:*:wordpress:*:*

24 Jun 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) El complemento Bricks Builder para WordPress es vulnerable a Insecure Direct Object Reference en todas las versiones hasta la 1.9.8 incluida a través del parámetro postId debido a la falta de validación en una clave controlada por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, modifiquen publicaciones y páginas creadas por otros usuarios, incluidos los administradores. Como requisito para esto, un administrador tendría que habilitar el acceso al editor específicamente para dicho usuario o habilitarlo para todos los usuarios con un determinado tipo de cuenta de usuario.

22 Jun 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-22 05:15

Updated : 2024-11-21 09:43


NVD link : CVE-2024-4874

Mitre link : CVE-2024-4874

CVE.ORG link : CVE-2024-4874


JSON object : View

Products Affected

bricksbuilder

  • bricks
CWE
CWE-639

Authorization Bypass Through User-Controlled Key