First published: Tue Jan 21 2025(Updated: )
The Visual Website Collaboration, Feedback & Project Management – Atarim plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the wpf_delete_file and wpf_delete_file functions in all versions up to, and including, 4.0.9. This makes it possible for unauthenticated attackers to delete project pages and files.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atarim Visual Website Collaboration, Feedback & Project Management for WordPress | <4.1.0 | |
Atarim | <=4.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-12104 has a medium severity rating due to the potential for unauthorized data loss.
To fix CVE-2024-12104, update the Atarim plugin for WordPress to version 4.1.0 or later.
All versions of the Atarim plugin for WordPress up to and including 4.0.9 are affected by CVE-2024-12104.
The vulnerable functions in CVE-2024-12104 are wpf_delete_file and wpf_delete_file, which lack proper capability checks.
Yes, CVE-2024-12104 can lead to unauthorized loss of data if exploited due to the missing capability checks.