The Zephyr Project Manager plugin for WordPress is vulnerable to limited privilege escalation in all versions up to, and including, 3.3.101. This is due to the plugin not properly checking a users capabilities before allowing them to enable access to the plugin's settings through the update_user_access() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to grant themselves full access to the plugin's settings.
Metrics
Affected Vendors & Products
References
History
Tue, 11 Feb 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-863 | |
CPEs | cpe:2.3:a:zephyr-one:zephyr_project_manager:*:*:*:*:*:wordpress:*:* |
Thu, 15 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zephyr-one
Zephyr-one zephyr Project Manager |
|
CPEs | cpe:2.3:a:zephyr-one:zephyr_project_manager:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zephyr-one
Zephyr-one zephyr Project Manager |
|
Metrics |
ssvc
|
Thu, 15 Aug 2024 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Zephyr Project Manager plugin for WordPress is vulnerable to limited privilege escalation in all versions up to, and including, 3.3.101. This is due to the plugin not properly checking a users capabilities before allowing them to enable access to the plugin's settings through the update_user_access() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to grant themselves full access to the plugin's settings. | |
Title | Zephyr Project Manager <= 3.3.101 - Authenticated (Subscriber+) Limited Privilege Escalation | |
Weaknesses | CWE-285 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-15T14:36:40.530Z
Reserved: 2024-08-08T18:14:38.485Z
Link: CVE-2024-7624

Updated: 2024-08-15T14:36:34.722Z

Status : Analyzed
Published: 2024-08-15T03:15:05.070
Modified: 2025-02-11T20:13:25.027
Link: CVE-2024-7624

No data.