First published: Wed Feb 19 2025(Updated: )
The Raptive Ads plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the site_ads_files_reset() and cls_file_reset() functions in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to reset the ad and cls files.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Raptive Ads | <=3.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13364 is considered a critical vulnerability due to the potential for unauthorized access and data manipulation.
To fix CVE-2024-13364, update the Raptive Ads plugin to version 3.6.4 or later, which includes the necessary capability checks.
CVE-2024-13364 allows unauthenticated attackers to reset ad settings, which could disrupt your advertising strategy and lead to unauthorized site changes.
All versions of the Raptive Ads plugin up to and including 3.6.3 are vulnerable to CVE-2024-13364.
As a temporary workaround for CVE-2024-13364, disable the Raptive Ads plugin until you can update to a fixed version.