First published: Sat Nov 09 2024(Updated: )
The CE21 Suite plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ce21_single_sign_on_save_api_settings' function in versions up to, and including, 2.2.0. This makes it possible for unauthenticated attackers to change plugin settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
CE21 CE21 Suite | <=2.2.0 | |
CE21 Suite | <=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10294 has a high severity rating due to its potential for unauthorized data modification.
To fix CVE-2024-10294, update the CE21 Suite plugin to version 2.3.0 or later where the vulnerability has been addressed.
Users of the CE21 Suite plugin for WordPress versions up to and including 2.2.0 are affected by CVE-2024-10294.
CVE-2024-10294 is an unauthorized modification of data vulnerability due to a missing capability check.
Yes, CVE-2024-10294 can be exploited remotely by unauthenticated attackers.