Vulnerability Description
The Visual Website Collaboration, Feedback & Project Management – Atarim plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 3.22.6. This is due to the use of hardcoded credentials to authenticate all the incoming API requests. This makes it possible for unauthenticated attackers to modify plugin settings, delete posts, modify post titles, and upload images.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/atarim-visual-collaboration/tags/3.18
- https://plugins.trac.wordpress.org/changeset?old=3076514&old_path=atarim-visual-
- https://www.wordfence.com/threat-intel/vulnerabilities/id/29532f4d-e830-4c99-ad7
- https://plugins.trac.wordpress.org/browser/atarim-visual-collaboration/tags/3.18
- https://plugins.trac.wordpress.org/changeset?old=3076514&old_path=atarim-visual-
- https://www.wordfence.com/threat-intel/vulnerabilities/id/29532f4d-e830-4c99-ad7
FAQ
What is CVE-2024-2038?
CVE-2024-2038 is a vulnerability with a CVSS score of 7.5 (HIGH). The Visual Website Collaboration, Feedback & Project Management – Atarim plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 3.22.6. This is due to the use ...
How severe is CVE-2024-2038?
CVE-2024-2038 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-2038?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.