First published: Wed Jan 08 2025(Updated: )
The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to modification of data due to a missing capability check on several functions in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify webinars.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Webinarpress | <1.33.25 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11271 is classified as a medium severity vulnerability due to its potential for data modification by authenticated users.
To fix CVE-2024-11271, update the WebinarPress plugin to version 1.33.25 or later.
CVE-2024-11271 affects all versions of the WebinarPress plugin for WordPress up to and including version 1.33.24.
CVE-2024-11271 enables authenticated attackers with subscriber-level access to modify data in the WordPress site.
As a workaround for CVE-2024-11271, consider adjusting user roles and capabilities until you can apply the necessary plugin update.