First published: Thu Aug 15 2024(Updated: )
The Zephyr Project Manager plugin for WordPress is vulnerable to limited privilege escalation in all versions up to, and including, 3.3.101. This is due to the plugin not properly checking a users capabilities before allowing them to enable access to the plugin's settings through the update_user_access() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to grant themselves full access to the plugin's settings.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dylan James Zephyr Project Manager | <3.3.102 | |
Dylan James Zephyr Project Manager | <=3.3.101 | |
WP Project Manager | <=3.3.101 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-7624 is classified as a limited privilege escalation vulnerability.
To fix CVE-2024-7624, update the Zephyr Project Manager plugin to version 3.3.102 or later.
All versions of the Zephyr Project Manager plugin up to and including 3.3.101 are affected by CVE-2024-7624.
By exploiting CVE-2024-7624, attackers can escalate privileges and gain unauthorized access to the plugin's settings.
A potential workaround for CVE-2024-7624 is to restrict user access and capabilities manually until the plugin is updated.