Vulnerability Description
The ACF Front End Editor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_texts() function in all versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary post title, content, and ACF data.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/acf-front-end-editor/trunk/public/cla
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8e7cbe45-5dd5-4b8f-850
- https://plugins.trac.wordpress.org/browser/acf-front-end-editor/trunk/public/cla
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8e7cbe45-5dd5-4b8f-850
FAQ
What is CVE-2024-3072?
CVE-2024-3072 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The ACF Front End Editor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_texts() function in all versions up to, and including, ...
How severe is CVE-2024-3072?
CVE-2024-3072 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-3072?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.