Vulnerability Description
The uListing plugin for WordPress is vulnerable to Unauthenticated Arbitrary Account Changes in versions up to, and including, 1.6.6. This is due to missing login checks on the stm_listing_profile_edit AJAX action. This makes it possible for unauthenticated attackers to edit any account on the blog, such as changing the admin account's email address.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stylemixthemes | Ulisting | <= 1.6.6 |
Related Weaknesses (CWE)
References
- https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vuExploit
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/41800ea9-1ace-42fc-9e7Third Party Advisory
- https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vuExploit
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/41800ea9-1ace-42fc-9e7Third Party Advisory
FAQ
What is CVE-2021-4346?
CVE-2021-4346 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The uListing plugin for WordPress is vulnerable to Unauthenticated Arbitrary Account Changes in versions up to, and including, 1.6.6. This is due to missing login checks on the stm_listing_profile_edi...
How severe is CVE-2021-4346?
CVE-2021-4346 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-4346?
Check the references section above for vendor advisories and patch information. Affected products include: Stylemixthemes Ulisting.