First published: Fri Feb 07 2025(Updated: )
The WP ALL Export Pro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to improper user input validation and sanitization in all versions up to, and including, 1.9.1. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WP All Export | <=1.9.1 | |
WP All Export | <1.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7425 has a high severity level due to its potential for privilege escalation and unauthorized data modifications.
To fix CVE-2024-7425, users should update the WP All Export Pro plugin to version 1.9.2 or later.
All users of WP All Export Pro versions up to and including 1.9.1 are affected by CVE-2024-7425.
CVE-2024-7425 can enable authenticated attackers to modify data improperly due to insufficient input validation.
CVE-2024-7425 is a local vulnerability that requires authentication to exploit.