First published: Wed Jun 07 2023(Updated: )
The uListing plugin for WordPress is vulnerable to authorization bypass via wp_route due to missing capability checks, and a missing security nonce, in the StmListingSingleLayout::import_new_layout method in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to change any WordPress option in the database.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
StylemixThemes uListing | <1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-4381 is a vulnerability in the uListing plugin for WordPress that allows for authorization bypass and potential attacks by unauthenticated users.
CVE-2021-4381 is classified as critical with a severity score of 9.8.
CVE-2021-4381 affects versions up to and including 1.6.6 of the uListing plugin for WordPress.
CVE-2021-4381 allows unauthenticated attackers to bypass authorization and potentially perform malicious actions on affected WordPress sites.
To mitigate the vulnerability in the uListing plugin for WordPress, it is recommended to update to version 1.7 or later of the plugin.