The WP ALL Export Pro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to improper user input validation and sanitization in all versions up to, and including, 1.9.1. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Soflyy
Soflyy wp All Export |
|
CPEs | cpe:2.3:a:soflyy:wp_all_export:*:*:*:*:pro:wordpress:*:* | |
Vendors & Products |
Soflyy
Soflyy wp All Export |
Fri, 07 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 07 Feb 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP ALL Export Pro plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to improper user input validation and sanitization in all versions up to, and including, 1.9.1. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. | |
Title | WP All Export Pro <= 1.9.1 - Authenticated (ShopManager+) Arbtirary Options Update | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-02-07T16:38:32.242Z
Reserved: 2024-08-02T15:47:15.223Z
Link: CVE-2024-7425

Updated: 2025-02-07T16:38:25.233Z

Status : Analyzed
Published: 2025-02-07T17:15:30.603
Modified: 2025-02-11T19:12:49.997
Link: CVE-2024-7425

No data.