First published: Tue Jul 09 2024(Updated: )
Authentication Bypass by Spoofing vulnerability in Patreon Patreon WordPress allows Functionality Misuse.This issue affects Patreon WordPress: from n/a through 1.9.0.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Plugin for Patreon | >n/a<=1.9.0 | |
WordPress Patreon Plugin | <=1.9.0 |
Update to 1.9.1 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37430 has been classified as a high severity vulnerability due to its potential for authentication bypass and functionality misuse.
To fix CVE-2024-37430, upgrade the Patreon WordPress plugin to version 1.9.1 or later immediately.
CVE-2024-37430 affects all versions of the Patreon WordPress plugin from n/a up to 1.9.0.
CVE-2024-37430 is an authentication bypass by spoofing vulnerability.
Yes, CVE-2024-37430 can potentially lead to unauthorized access and data breaches if exploited.