Vulnerability Description
The uListing plugin for WordPress is vulnerable to authorization bypass via Ajax due to missing capability checks, missing input validation, and a missing security nonce in the stm_update_email_data AJAX action in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to change any WordPress option in the database.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stylemixthemes | Ulisting | <= 1.6.6 |
Related Weaknesses (CWE)
References
- https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vuExploit
- https://www.wordfence.com/threat-intel/vulnerabilities/id/1814537d-8307-4d1f-86cThird Party Advisory
- https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vuExploit
- https://www.wordfence.com/threat-intel/vulnerabilities/id/1814537d-8307-4d1f-86cThird Party Advisory
FAQ
What is CVE-2021-4341?
CVE-2021-4341 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The uListing plugin for WordPress is vulnerable to authorization bypass via Ajax due to missing capability checks, missing input validation, and a missing security nonce in the stm_update_email_data A...
How severe is CVE-2021-4341?
CVE-2021-4341 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-4341?
Check the references section above for vendor advisories and patch information. Affected products include: Stylemixthemes Ulisting.