First published: Sat Feb 10 2024(Updated: )
The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the editor_html() function in all versions up to, and including, 6.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to view password protected and draft posts.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Awesome Support | <6.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-0596 is considered to be high due to the potential for unauthorized access to sensitive data.
To fix CVE-2024-0596, update the Awesome Support plugin to version 6.1.8 or later.
CVE-2024-0596 affects all versions of the Awesome Support plugin up to and including version 6.1.7.
Yes, exploitation of CVE-2024-0596 requires authentication, allowing authenticated attackers to access restricted data.
CVE-2024-0596 is a vulnerability that occurs due to a missing capability check in the editor_html() function.