Vulnerability Description
The uListing plugin for WordPress is vulnerable to authorization bypass via wp_route due to missing capability checks, and a missing security nonce, in the StmListingSingleLayout::import_new_layout method in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to change any WordPress option in the database.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Stylemixthemes | Ulisting | < 1.7 |
Related Weaknesses (CWE)
References
- https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vuExploit
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ff5755dc-2262-47f6-ac3Third Party Advisory
- https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vuExploit
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ff5755dc-2262-47f6-ac3Third Party Advisory
FAQ
What is CVE-2021-4381?
CVE-2021-4381 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The uListing plugin for WordPress is vulnerable to authorization bypass via wp_route due to missing capability checks, and a missing security nonce, in the StmListingSingleLayout::import_new_layout me...
How severe is CVE-2021-4381?
CVE-2021-4381 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-4381?
Check the references section above for vendor advisories and patch information. Affected products include: Stylemixthemes Ulisting.