First published: Mon Apr 12 2021(Updated: )
The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Patreon Patreon Wordpress | <1.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-24230 is high with a severity value of 8.1.
CVE-2021-24230 allows attackers to make a logged in user overwrite or create arbitrary user metadata on the victim's account.
The Patreon WordPress plugin before version 1.7.0 is affected by CVE-2021-24230.
An attacker can exploit CVE-2021-24230 by visiting the victim's account and using a Cross-Site Request Forgery attack to overwrite or create arbitrary user metadata.
Yes, the fix for CVE-2021-24230 is to update the Patreon WordPress plugin to version 1.7.0 or later.