First published: Fri Dec 13 2024(Updated: )
The WP Crowdfunding plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the install_woocommerce_plugin() function action in all versions up to, and including, 2.1.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install WooCommerce. This has a limited impact on most sites because WooCommerce is a requirement.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeum WP Crowdfunding | <2.1.13 | |
WordPress WP Crowdfunding | <=2.1.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11911 has a medium severity rating due to its potential for unauthorized plugin installations.
To fix CVE-2024-11911, update the WP Crowdfunding plugin to version 2.1.13 or later.
All users of the WP Crowdfunding plugin for WordPress up to and including version 2.1.12 are affected by CVE-2024-11911.
CVE-2024-11911 can enable authenticated attackers to install unauthorized plugins.
As a workaround for CVE-2024-11911, users can restrict access to the install_woocommerce_plugin() function until an update is applied.