The Exertio Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.3.1. This is due to the plugin not properly validating a user's identity prior to updating their password through the fl_forgot_pass_new() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 01 Mar 2025 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Exertio Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.3.1. This is due to the plugin not properly validating a user's identity prior to updating their password through the fl_forgot_pass_new() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account. | |
Title | Exertio Framework <= 1.3.1 - Unauthenticated Arbitrary User Password Update | |
Weaknesses | CWE-620 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-03-03T20:57:20.754Z
Reserved: 2025-01-13T20:47:22.299Z
Link: CVE-2024-13373

Updated: 2025-03-03T20:54:19.340Z

Status : Received
Published: 2025-03-01T07:15:10.770
Modified: 2025-03-01T07:15:10.770
Link: CVE-2024-13373

No data.