First published: Tue May 21 2024(Updated: )
The ShopLentor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_dismiss function in all versions up to, and including, 2.8.8. This makes it possible for authenticated attackers, with contributor-level access and above, to set arbitrary WordPress options to "true". NOTE: This vulnerability can be exploited by attackers with subscriber- or customer-level access and above if (1) the WooCommerce plugin is deactivated or (2) access to the default WordPress admin dashboard is explicitly enabled for authenticated users.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
ShopLentor | <=2.8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4566 has a high severity rating due to the potential for unauthorized modification of data.
To fix CVE-2024-4566, update the ShopLentor plugin to version 2.8.9 or later, which includes the necessary capability checks.
CVE-2024-4566 affects all versions of the ShopLentor plugin up to and including version 2.8.8 for WordPress.
An authenticated attacker with contributor-level access can exploit CVE-2024-4566 to modify data.
There are currently no known active exploits for CVE-2024-4566, but it remains a serious vulnerability.