The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validation on the 'openid' user controlled key that determines what user will be updated. This makes it possible for unauthenticated attackers to update arbitrary user's accounts, including their email to a @weixin.com email, which can the be leveraged to reset the password of the user's account, including administrators.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Oct 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jianbo rest Api To Miniprogram
|
|
CPEs | cpe:2.3:a:jianbo:rest_api_to_miniprogram:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Jianbo rest Api To Miniprogram
|
Wed, 25 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Jianbo
Jianbo rest-api-to-miniprogram |
|
CPEs | cpe:2.3:a:jianbo:rest-api-to-miniprogram:*:*:*:*:*:*:*:* | |
Vendors & Products |
Jianbo
Jianbo rest-api-to-miniprogram |
|
Metrics |
ssvc
|
Wed, 25 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validation on the 'openid' user controlled key that determines what user will be updated. This makes it possible for unauthenticated attackers to update arbitrary user's accounts, including their email to a @weixin.com email, which can the be leveraged to reset the password of the user's account, including administrators. | |
Title | REST API TO MiniProgram <= 4.7.1 - Unauthenticated Arbitrary User Email Update and Privilege Escalation via Account Takeover | |
Weaknesses | CWE-639 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-09-25T13:24:46.812Z
Reserved: 2024-09-05T16:14:56.147Z
Link: CVE-2024-8485

Updated: 2024-09-25T13:24:42.401Z

Status : Analyzed
Published: 2024-09-25T03:15:05.190
Modified: 2024-10-02T16:19:15.993
Link: CVE-2024-8485

No data.