578
VMScore

CVE-2021-24892

Published: 23/11/2021 Updated: 29/11/2021
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Insecure Direct Object Reference in edit function of Advanced Forms (Free & Pro) prior to 1.6.9 allows authenticated remote malicious user to change arbitrary user's email address and request for reset password, which could lead to take over of WordPress's administrator account. To exploit this vulnerability, an attacker must register to obtain a valid WordPress's user and use such user to authenticate with WordPress in order to exploit the vulnerable edit function.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

advanced forms project advanced forms