First published: Wed Oct 16 2024(Updated: )
The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.4. This is due to the appp_reset_password() and validate_reset_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
AppPresser | <=4.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9305 is classified as a privilege escalation vulnerability that could lead to account takeover.
To fix CVE-2024-9305, ensure you update the AppPresser – Mobile App Framework plugin to version 4.4.5 or later.
CVE-2024-9305 affects all versions of the AppPresser Mobile App Framework up to and including 4.4.4.
CVE-2024-9305 is caused by insufficient controls in the appp_reset_password() and validate_reset_password() functions.
Any WordPress site using the affected versions of the AppPresser – Mobile App Framework plugin is vulnerable to CVE-2024-9305.