First published: Thu Sep 26 2024(Updated: )
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the enable_shop() function in all versions up to, and including, 5.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable shop functionality.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPChill Download Monitor | <5.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8552 has a high severity rating due to the potential for unauthorized data modification.
To fix CVE-2024-8552, update the Download Monitor plugin to version 5.0.10 or later.
Authenticated users with Subscriber-level access are particularly affected by CVE-2024-8552.
CVE-2024-8552 allows attackers to modify data without proper authorization.
All versions of the Download Monitor plugin up to and including 5.0.9 are vulnerable to CVE-2024-8552.