First published: Wed Jun 07 2023(Updated: )
The uListing plugin for WordPress is vulnerable to authorization bypass as most actions and endpoints are accessible to unauthenticated users, lack security nonces, and data is seldom validated. This issue exists in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to conduct numerous administrative actions, including those less critical than the explicitly outlined ones in our detection.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
StylemixThemes uListing | <=1.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4370 is a vulnerability in the uListing plugin for WordPress that allows unauthorized access and lacks proper data validation.
CVE-2021-4370 has a severity rating of 9.8, which is categorized as critical.
Versions up to and including 1.6.6 of the uListing plugin for WordPress are affected by CVE-2021-4370.
An attacker can exploit CVE-2021-4370 by bypassing authorization and accessing actions and endpoints that should be restricted to authenticated users.
Yes, a fix for CVE-2021-4370 is available. It is recommended to update to the latest version of the uListing plugin for WordPress.