Vulnerability Description
The Bricks Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.8 via the postId parameter due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify posts and pages created by other users including admins. As a requirement for this, an admin would have to enable access to the editor specifically for such a user or enable it for all users with a certain user account type.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bricksbuilder | Bricks | < 1.9.9 |
Related Weaknesses (CWE)
References
- https://bricksbuilder.io/release/bricks-1-9-9/#access-control-fix-for-user-role-Release Notes
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6d63e898-43e5-42b5-96bThird Party Advisory
- https://bricksbuilder.io/release/bricks-1-9-9/#access-control-fix-for-user-role-Release Notes
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6d63e898-43e5-42b5-96bThird Party Advisory
FAQ
What is CVE-2024-4874?
CVE-2024-4874 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Bricks Builder plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.9.8 via the postId parameter due to missing validation on a user contr...
How severe is CVE-2024-4874?
CVE-2024-4874 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-4874?
Check the references section above for vendor advisories and patch information. Affected products include: Bricksbuilder Bricks.