First published: Thu Dec 22 2022(Updated: )
The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various AJAX actions in versions up to, and including, 2.5.6. Authenticated users can use an easily available nonce value to create header templates and make additional changes to the site, as the plugin does not use capability checks for this purpose.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jeg Elementor Kit | <2.5.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-3794 is considered medium due to the potential for unauthorized changes to the site.
To fix CVE-2022-3794, update the Jeg Elementor Kit plugin to version 2.5.7 or later.
Users of the Jeg Elementor Kit plugin for WordPress in versions up to 2.5.6 are affected by CVE-2022-3794.
CVE-2022-3794 is an authorization bypass vulnerability that affects AJAX actions in the Jeg Elementor Kit plugin.
No, CVE-2022-3794 can only be exploited by authenticated users.