First published: Fri Nov 01 2024(Updated: )
Missing Authorization vulnerability in MagePeople Team WpTravelly allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WpTravelly: from n/a through 1.7.7.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress WpTravelly Plugin | <=1.7.7 | |
WP Travel | <=1.7.7 |
Update to 1.7.8 or a higher version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43212 is rated as a high severity vulnerability due to its potential to allow unauthorized access to critical functionality.
To fix CVE-2024-43212, update the WpTravelly plugin to version 1.7.8 or later where the issue has been patched.
CVE-2024-43212 affects versions of the WpTravelly plugin up to and including 1.7.7.
CVE-2024-43212 is categorized as a missing authorization vulnerability, specifically related to broken access control.
Yes, CVE-2024-43212 can be exploited remotely, allowing attackers to access restricted functionality without proper authorization.