First published: Fri Nov 01 2024(Updated: )
The Multiple Page Generator Plugin – MPG plugin for WordPress is vulnerable to unauthorized modification of and access to data due to a missing capability check on several functions in all versions up to, and including, 4.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those functions intended for admin use resulting in subscribers being able to upload csv files and view the contents of MPG projects.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Multiple Page Generator Plugin | <=4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7424 is classified as a medium severity vulnerability due to its potential for unauthorized data modification and access.
To mitigate CVE-2024-7424, upgrade the Multiple Page Generator Plugin to version 4.0.2 or higher.
CVE-2024-7424 affects all versions of the Multiple Page Generator Plugin for WordPress up to and including 4.0.1.
CVE-2024-7424 is a vulnerability due to missing capability checks, allowing unauthorized access and modification of data.
No, CVE-2024-7424 requires authentication for exploitation, allowing only authenticated attackers to leverage the vulnerability.