Vulnerability Description
The Mega Addons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the vc_saving_data function in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin's settings.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Topdigitaltrends | Mega Addons For Wpbakery Page Builder | <= 4.2.7 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/mega-addons-for-visual-composer/tags/PatchThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-974
- https://plugins.trac.wordpress.org/browser/mega-addons-for-visual-composer/tags/PatchThird Party Advisory
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-974Third Party Advisory
FAQ
What is CVE-2022-4501?
CVE-2022-4501 is a vulnerability with a CVSS score of 7.1 (HIGH). The Mega Addons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the vc_saving_data function in versions up to, and including, 4.3.0. This makes it possi...
How severe is CVE-2022-4501?
CVE-2022-4501 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-4501?
Check the references section above for vendor advisories and patch information. Affected products include: Topdigitaltrends Mega Addons For Wpbakery Page Builder.