Vulnerability Description
The WP Guppy WordPress plugin before 1.3 does not have any authorisation in some of the REST API endpoints, allowing any user to call them and could lead to sensitive information disclosure, such as usernames and chats between users, as well as be able to send messages as an arbitrary user
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wp-Guppy | Wp Guppy | < 1.3 |
Related Weaknesses (CWE)
References
- https://github.com/Keyvanhardani/WP-Guppy-A-live-chat-WP-JSON-API-Sensitive-InfoExploitThird Party Advisory
- https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900ExploitThird Party Advisory
- https://github.com/Keyvanhardani/WP-Guppy-A-live-chat-WP-JSON-API-Sensitive-InfoExploitThird Party Advisory
- https://wpscan.com/vulnerability/747e6c7e-a167-4d82-b6e6-9e8613f0e900ExploitThird Party Advisory
FAQ
What is CVE-2021-24997?
CVE-2021-24997 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The WP Guppy WordPress plugin before 1.3 does not have any authorisation in some of the REST API endpoints, allowing any user to call them and could lead to sensitive information disclosure, such as u...
How severe is CVE-2021-24997?
CVE-2021-24997 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24997?
Check the references section above for vendor advisories and patch information. Affected products include: Wp-Guppy Wp Guppy.