First published: Wed Sep 04 2024(Updated: )
The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to privilege escalation/de-escalation and account takeover due to an insufficient capability check on the update_item_permissions_check and create_item_permissions_check functions in all versions up to, and including, 4.2.0. This makes it possible for unauthenticated attackers to change the password of any user with the vendor role, create new users with the vendor role, and demote other users like administrators to the vendor role.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
MultiVendorX | <4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8289 has been classified as a high severity vulnerability that allows for privilege escalation and account takeover.
To fix CVE-2024-8289, update the MultiVendorX plugin to version 4.2.1 or later where the vulnerability has been patched.
The potential impacts of CVE-2024-8289 include unauthorized access to user accounts and administrative functions within the MultiVendorX plugin.
CVE-2024-8289 affects all versions of MultiVendorX up to version 4.2.1.
Any WordPress site using the MultiVendorX plugin versions prior to 4.2.1 is vulnerable to CVE-2024-8289.