First published: Tue Oct 22 2024(Updated: )
The TeploBot - Telegram Bot for WP plugin for WordPress is vulnerable to sensitive information disclosure due to missing authorization checks on the 'service_process' function in all versions up to, and including, 1.3. This makes it possible for unauthenticated attackers to view the Telegram Bot Token, which is a secret token to control the bot.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Te-st Teplobot Wordpress | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9627 is categorized as a medium severity vulnerability due to its potential for sensitive information disclosure.
To fix CVE-2024-9627, update the TeploBot plugin to version 1.3.1 or higher where the vulnerability has been addressed.
CVE-2024-9627 can be exploited by unauthenticated attackers to disclose sensitive information from the WordPress site.
CVE-2024-9627 affects all versions of the TeploBot plugin up to and including 1.3.
Currently, the only recommended action for CVE-2024-9627 is to update the plugin, as there are no effective workarounds.