The Falang multilanguage for WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several functions in all versions up to, and including, 1.3.52. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update and delete translations and expose the administrator email address.
References
Configurations
History
01 Mar 2025, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/falang/trunk/admin/class-falang-admin.php - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3131499/ - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/cd4d67cd-5fb0-425d-8b22-c69ebb0ffa72?source=cve - Third Party Advisory | |
First Time |
Faboba falang
Faboba |
|
CPE | cpe:2.3:a:faboba:falang:*:*:*:*:*:wordpress:*:* |
08 Aug 2024, 13:04
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Aug 2024, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-08 05:15
Updated : 2025-03-01 02:14
NVD link : CVE-2024-6869
Mitre link : CVE-2024-6869
CVE.ORG link : CVE-2024-6869
JSON object : View
Products Affected
faboba
- falang
CWE
CWE-862
Missing Authorization