Vulnerability Description
The Linkz.ai plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'check_auth' and 'check_logout' functions in versions up to, and including, 1.1.8. This makes it possible for unauthenticated attackers to update plugin settings.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linkz.Ai | Linkz.Ai | < 1.2.0 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/linkz-ai/tags/1.1.8/init.php#L142Product
- https://plugins.trac.wordpress.org/browser/linkz-ai/tags/1.1.8/init.php#L159Product
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/b4b4ca5b-c806-4b68-acbThird Party Advisory
FAQ
What is CVE-2024-9586?
CVE-2024-9586 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Linkz.ai plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'check_auth' and 'check_logout' functions in versions up to, and including...
How severe is CVE-2024-9586?
CVE-2024-9586 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9586?
Check the references section above for vendor advisories and patch information. Affected products include: Linkz.Ai Linkz.Ai.