CVE-2024-9265

The Echo RSS Feed Post Generator plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 5.4.6. This is due to the plugin not properly restricting the roles that can set during registration through the echo_check_post_header_sent() function. This makes it possible for unauthenticated attackers to register as an administrator.
Configurations

Configuration 1 (hide)

cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:wordpress:*:*

History

07 Oct 2024, 18:48

Type Values Removed Values Added
First Time Coderevolution
Coderevolution echo Rss Feed Post Generator
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/c099f401-4b05-4532-8e31-af1b1dea7eca?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/c099f401-4b05-4532-8e31-af1b1dea7eca?source=cve - Third Party Advisory
References () https://codecanyon.net/item/echo-rss-feed-post-generator-plugin-for-wordpress/19486974 - () https://codecanyon.net/item/echo-rss-feed-post-generator-plugin-for-wordpress/19486974 - Product
CWE CWE-269 NVD-CWE-noinfo
CPE cpe:2.3:a:coderevolution:echo_rss_feed_post_generator:*:*:*:*:*:wordpress:*:*

01 Oct 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-01 09:15

Updated : 2024-10-07 18:48


NVD link : CVE-2024-9265

Mitre link : CVE-2024-9265


JSON object : View

Products Affected

coderevolution

  • echo_rss_feed_post_generator