Vulnerability Description
The uListing plugin for WordPress is vulnerable to authorization bypass due to missing capability checks, and a missing security nonce, on the UlistingUserRole::save_role_api function in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to arbitrarily delete site posts and pages.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stylemixthemes | Ulisting | <= 1.6.6 |
Related Weaknesses (CWE)
References
- https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vuExploit
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://wordpress.org/plugins/ulisting/#developersProduct
- https://www.wordfence.com/threat-intel/vulnerabilities/id/71aa14b8-39bc-4b91-a7cThird Party Advisory
- https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vuExploit
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://wordpress.org/plugins/ulisting/#developersProduct
- https://www.wordfence.com/threat-intel/vulnerabilities/id/71aa14b8-39bc-4b91-a7cThird Party Advisory
FAQ
What is CVE-2021-4357?
CVE-2021-4357 is a vulnerability with a CVSS score of 9.1 (CRITICAL). The uListing plugin for WordPress is vulnerable to authorization bypass due to missing capability checks, and a missing security nonce, on the UlistingUserRole::save_role_api function in versions up t...
How severe is CVE-2021-4357?
CVE-2021-4357 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-4357?
Check the references section above for vendor advisories and patch information. Affected products include: Stylemixthemes Ulisting.