First published: Tue Apr 09 2024(Updated: )
The Accordion plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'accordions_duplicate_post_as_draft' function in all versions up to, and including, 2.2.96. This makes it possible for authenticated attackers, with contributor access and above, to duplicate arbitrary posts, allowing access to the contents of password-protected posts.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Accordion | <=2.2.96 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1641 has a high severity due to the potential for unauthorized access and data modification.
To mitigate CVE-2024-1641, update the Accordion plugin for WordPress to version 2.2.97 or higher.
CVE-2024-1641 affects all versions of the Accordion plugin for WordPress up to and including version 2.2.96.
Authenticated attackers can exploit CVE-2024-1641 to duplicate posts as drafts, leading to unauthorized data access or modifications.
CVE-2024-1641 is not restricted to specific installations but applies to any WordPress site using the vulnerable Accordion plugin version.