The Mega Addons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the vc_saving_data function in versions up to, and including, 4.2.7. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin's settings.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/browser/mega-addons-for-visual-composer/tags/4.2.7/main.php#L87 | Patch Third Party Advisory |
https://www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-9748-5359efd51754 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Wordfence
Published: 2022-12-14T20:38:45.281Z
Updated:
Reserved: 2022-12-14T20:38:39.603Z
Link: CVE-2022-4501
JSON object: View
NVD Information
Status : Modified
Published: 2022-12-14T21:15:15.043
Modified: 2023-11-07T03:58:00.630
Link: CVE-2022-4501
JSON object: View
Redhat Information
No data.
CWE
No CWE.