The WPS Telegram Chat plugin for WordPress is vulnerable to authorization bypass due to a missing capability check when accessing messages in versions up to, and including, 4.5.4. This makes it possible for unauthenticated attackers to view the messages that are sent through the Telegram Bot API.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Jan 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
10web
10web wps Telegram Chat |
|
CPEs | cpe:2.3:a:10web:wps_telegram_chat:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpsolutions
Wpsolutions wps Telegram Chat |
10web
10web wps Telegram Chat |
Thu, 23 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wpsolutions
Wpsolutions wps Telegram Chat |
|
CPEs | cpe:2.3:a:wpsolutions:wps_telegram_chat:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Wpsolutions
Wpsolutions wps Telegram Chat |
Fri, 25 Oct 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 25 Oct 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WPS Telegram Chat plugin for WordPress is vulnerable to authorization bypass due to a missing capability check when accessing messages in versions up to, and including, 4.5.4. This makes it possible for unauthenticated attackers to view the messages that are sent through the Telegram Bot API. | |
Title | WPS Telegram Chat <= 4.5.4 - Missing Authorization to Information Exposure | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-25T15:21:28.685Z
Reserved: 2024-10-08T13:02:17.969Z
Link: CVE-2024-9630

Updated: 2024-10-25T15:21:23.498Z

Status : Analyzed
Published: 2024-10-25T08:15:03.657
Modified: 2025-01-24T14:07:11.977
Link: CVE-2024-9630

No data.