First published: Thu May 23 2024(Updated: )
The Visual Website Collaboration, Feedback & Project Management – Atarim plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 3.22.6. This is due to the use of hardcoded credentials to authenticate all the incoming API requests. This makes it possible for unauthenticated attackers to modify plugin settings, delete posts, modify post titles, and upload images.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Atarim | <=3.22.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2038 is rated as a critical vulnerability due to unauthorized access risks from hardcoded credentials.
To fix CVE-2024-2038, update the Atarim plugin to version 3.22.7 or later, which addresses the vulnerability.
All versions of the Atarim plugin up to and including 3.22.6 are affected by CVE-2024-2038.
CVE-2024-2038 allows attackers to gain unauthorized access to API requests, compromising site security.
The vendor of the product affected by CVE-2024-2038 is Atarim.