First published: Wed Jun 07 2023(Updated: )
The uListing plugin for WordPress is vulnerable to Unauthenticated Arbitrary Account Changes in versions up to, and including, 1.6.6. This is due to missing login checks on the stm_listing_profile_edit AJAX action. This makes it possible for unauthenticated attackers to edit any account on the blog, such as changing the admin account's email address.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Stylemixthemes Ulisting | <=1.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-4346.
The severity of CVE-2021-4346 is critical with a CVSS score of 7.5.
The uListing plugin for WordPress versions up to and including 1.6.6 is affected by CVE-2021-4346.
Unauthenticated attackers can exploit CVE-2021-4346 by editing any account on the affected blog.
Yes, a fix is available for CVE-2021-4346. It is recommended to update the uListing plugin for WordPress to the latest version.