8.1
CVSSv3

CVE-2021-24230

Published: 12/04/2021 Updated: 04/05/2021
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin prior to 1.7.0, allowing malicious users to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product