First published: Sat Jun 08 2024(Updated: )
The WP Force SSL & HTTPS SSL Redirect plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_save_setting' function in versions up to, and including, 1.66. This makes it possible for authenticated attackers, subscriber-level permissions and above, to update the plugin settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP Force SSL | <1.67 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5770 has a medium severity rating due to its potential for unauthorized data modification.
To fix CVE-2024-5770, update the WP Force SSL & HTTPS SSL Redirect plugin to version 1.67 or later.
CVE-2024-5770 affects users of the WP Force SSL plugin versions up to and including 1.66.
Authenticated attackers, including those with subscriber-level access, can exploit CVE-2024-5770.
The impact of CVE-2024-5770 includes unauthorized modification of settings within WordPress due to insufficient capability checks.