Vulnerability Description
The Rover IDX plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0.0.2905. This is due to insufficient validation and capability check on the 'rover_idx_refresh_social_callback' function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in to administrator. The vulnerability is partially patched in version 3.0.0.2905 and fully patched in version 3.0.0.2906.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Roveridx | Rover Idx | < 3.0.0.2906 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/admin/roverProduct
- https://plugins.trac.wordpress.org/browser/rover-idx/tags/3.0.0.2903/rover-sociaProduct
- https://plugins.trac.wordpress.org/changeset/3173032/rover-idx/trunk/rover-sociaPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5cf6a9fb-3c3b-48ad-a39Third Party Advisory
FAQ
What is CVE-2024-10002?
CVE-2024-10002 is a vulnerability with a CVSS score of 8.8 (HIGH). The Rover IDX plugin for WordPress is vulnerable to Authentication Bypass in versions up to, and including, 3.0.0.2905. This is due to insufficient validation and capability check on the 'rover_idx_re...
How severe is CVE-2024-10002?
CVE-2024-10002 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-10002?
Check the references section above for vendor advisories and patch information. Affected products include: Roveridx Rover Idx.