The FlyingPress plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 3.9.6. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to interact with the plugin in ways administrators are intended to. One action (save_config) allows for the configuration of an external CDN. This could be used to include malicious javascript from a source controlled by the attacker.
History

Sat, 21 Dec 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-06-07T01:51:25.584Z

Updated: 2024-12-20T23:52:51.217Z

Reserved: 2023-06-06T12:50:55.918Z

Link: CVE-2022-4948

cve-icon Vulnrichment

Updated: 2024-08-03T01:55:46.149Z

cve-icon NVD

Status : Modified

Published: 2023-06-07T02:15:15.687

Modified: 2024-11-21T07:36:18.570

Link: CVE-2022-4948

cve-icon Redhat

No data.