The uListing plugin for WordPress is vulnerable to authorization bypass as most actions and endpoints are accessible to unauthenticated users, lack security nonces, and data is seldom validated. This issue exists in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to conduct numerous administrative actions, including those less critical than the explicitly outlined ones in our detection.
Metrics
Affected Vendors & Products
References
History
Sat, 28 Dec 2024 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-12-28T00:53:26.691Z
Reserved: 2023-06-06T13:11:37.731Z
Link: CVE-2021-4370

Updated: 2024-08-03T17:23:10.721Z

Status : Modified
Published: 2023-06-07T02:15:14.903
Modified: 2024-11-21T06:37:31.643
Link: CVE-2021-4370

No data.