Vulnerabilites related to PureThemes - Realteo
Vulnerability from fkie_nvd
Published
2021-04-22 21:15
Modified
2024-11-21 05:52
Severity ?
Summary
The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
purethemes | findeo | * | |
purethemes | realteo | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:purethemes:findeo:*:*:*:*:*:wordpress:*:*", matchCriteriaId: "156BF978-930B-4D4E-8F98-11D87C6EB2AF", versionEndExcluding: "1.3.1", vulnerable: true, }, { criteria: "cpe:2.3:a:purethemes:realteo:*:*:*:*:*:wordpress:*:*", matchCriteriaId: "8682C4CD-462D-4C38-BCAC-A463C9FA5E14", versionEndExcluding: "1.2.4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue.", }, { lang: "es", value: "El plugin Realteo WordPress versiones anteriores a 1.2.4, usado por Findeo Theme, no saneaba apropiadamente los parámetros GET keyword_search, search_radius. _bedrooms y _bathrooms antes de generarlos en su página de propiedades, conllevando a un problema de tipo Cross-Site Scripting reflejado no autenticado", }, ], id: "CVE-2021-24237", lastModified: "2024-11-21T05:52:39.640", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-22T21:15:09.763", references: [ { source: "contact@wpscan.com", url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Findeo-WordPress-Theme-v1.3.0.txt", }, { source: "contact@wpscan.com", url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Realteo-WordPress-Plugin-v1.2.3.txt", }, { source: "contact@wpscan.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e", }, { source: "contact@wpscan.com", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Findeo-WordPress-Theme-v1.3.0.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Realteo-WordPress-Plugin-v1.2.3.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, ], sourceIdentifier: "contact@wpscan.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "contact@wpscan.com", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-04-22 21:15
Modified
2024-11-21 05:52
Severity ?
Summary
The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
purethemes | findeo | * | |
purethemes | realteo | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:purethemes:findeo:*:*:*:*:*:wordpress:*:*", matchCriteriaId: "156BF978-930B-4D4E-8F98-11D87C6EB2AF", versionEndExcluding: "1.3.1", vulnerable: true, }, { criteria: "cpe:2.3:a:purethemes:realteo:*:*:*:*:*:wordpress:*:*", matchCriteriaId: "8682C4CD-462D-4C38-BCAC-A463C9FA5E14", versionEndExcluding: "1.2.4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter.", }, { lang: "es", value: "El plugin Realteo WordPress versiones anteriores a 1.2.4, usado por Findeo Theme, no garantizaba que la propiedad solicitada a eliminar perteneciera al usuario que realizaba la petición, lo que permitía a cualquier usuario autenticado eliminar propiedades arbitrarias alterando el parámetro property_id", }, ], id: "CVE-2021-24238", lastModified: "2024-11-21T05:52:39.760", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-04-22T21:15:09.797", references: [ { source: "contact@wpscan.com", url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt", }, { source: "contact@wpscan.com", url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt", }, { source: "contact@wpscan.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", }, { source: "contact@wpscan.com", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Release Notes", "Vendor Advisory", ], url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, ], sourceIdentifier: "contact@wpscan.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "contact@wpscan.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-425", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2025-03-14 12:15
Modified
2025-03-25 20:13
Severity ?
Summary
The Realteo - Real Estate Plugin by Purethemes plugin for WordPress, used by the Findeo Theme, is vulnerable to authentication bypass in all versions up to, and including, 1.2.8. This is due to insufficient role restrictions in the 'do_register_user' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
purethemes | realteo | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:purethemes:realteo:*:*:*:*:*:wordpress:*:*", matchCriteriaId: "65F80A73-B8EA-48BF-81FC-4F4A14E994A6", versionEndExcluding: "1.2.9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Realteo - Real Estate Plugin by Purethemes plugin for WordPress, used by the Findeo Theme, is vulnerable to authentication bypass in all versions up to, and including, 1.2.8. This is due to insufficient role restrictions in the 'do_register_user' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role.", }, { lang: "es", value: "El complemento Realteo - Real Estate Plugin by Purethemes para WordPress, utilizado por el tema Findeo, es vulnerable a la omisión de autenticación en todas las versiones hasta la 1.2.8 incluida. Esto se debe a restricciones de rol insuficientes en la función \"do_register_user\". Esto permite que atacantes no autenticados registren una cuenta con el rol de administrador.", }, ], id: "CVE-2025-2232", lastModified: "2025-03-25T20:13:28.670", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "security@wordfence.com", type: "Primary", }, ], }, published: "2025-03-14T12:15:14.887", references: [ { source: "security@wordfence.com", tags: [ "Product", ], url: "https://docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { source: "security@wordfence.com", tags: [ "Third Party Advisory", ], url: "https://www.wordfence.com/threat-intel/vulnerabilities/id/abe73ecd-1325-4d6d-8545-d27f6116ca43?source=cve", }, ], sourceIdentifier: "security@wordfence.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-269", }, ], source: "security@wordfence.com", type: "Primary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2025-2232
Vulnerability from cvelistv5
Published
2025-03-14 11:15
Modified
2025-03-14 12:42
Severity ?
EPSS score ?
Summary
The Realteo - Real Estate Plugin by Purethemes plugin for WordPress, used by the Findeo Theme, is vulnerable to authentication bypass in all versions up to, and including, 1.2.8. This is due to insufficient role restrictions in the 'do_register_user' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PureThemes | Realteo |
Version: * ≤ 1.2.8 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-2232", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-03-14T12:39:37.845357Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-14T12:42:27.868Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Realteo", vendor: "PureThemes", versions: [ { lessThanOrEqual: "1.2.8", status: "affected", version: "*", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", value: "Tonn", }, ], descriptions: [ { lang: "en", value: "The Realteo - Real Estate Plugin by Purethemes plugin for WordPress, used by the Findeo Theme, is vulnerable to authentication bypass in all versions up to, and including, 1.2.8. This is due to insufficient role restrictions in the 'do_register_user' function. This makes it possible for unauthenticated attackers to register an account with the Administrator role.", }, ], metrics: [ { cvssV3_1: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-269", description: "CWE-269 Improper Privilege Management", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-14T11:15:52.827Z", orgId: "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", shortName: "Wordfence", }, references: [ { url: "https://www.wordfence.com/threat-intel/vulnerabilities/id/abe73ecd-1325-4d6d-8545-d27f6116ca43?source=cve", }, { url: "https://docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, ], timeline: [ { lang: "en", time: "2025-03-13T22:09:34.000+00:00", value: "Disclosed", }, ], title: "Realteo - Real Estate Plugin by Purethemes <= 1.2.8 - Authentication Bypass via 'do_register_user'", }, }, cveMetadata: { assignerOrgId: "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", assignerShortName: "Wordfence", cveId: "CVE-2025-2232", datePublished: "2025-03-14T11:15:52.827Z", dateReserved: "2025-03-11T22:28:58.175Z", dateUpdated: "2025-03-14T12:42:27.868Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-24237
Vulnerability from cvelistv5
Published
2021-04-22 21:00
Modified
2024-08-03 19:21
Severity ?
EPSS score ?
Summary
The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | PureThemes | Realteo |
Version: 1.2.4 < 1.2.4 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:21:18.662Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Findeo-WordPress-Theme-v1.3.0.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Realteo-WordPress-Plugin-v1.2.3.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Realteo", vendor: "PureThemes", versions: [ { lessThan: "1.2.4", status: "affected", version: "1.2.4", versionType: "custom", }, ], }, { product: "Findeo", vendor: "PureThemes", versions: [ { lessThan: "1.3.1", status: "affected", version: "1.3.1", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "m0ze", }, ], descriptions: [ { lang: "en", value: "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-79", description: "CWE-79 Cross-site Scripting (XSS)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-22T21:00:50", orgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", shortName: "WPScan", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e", }, { tags: [ "x_refsource_MISC", ], url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { tags: [ "x_refsource_MISC", ], url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Findeo-WordPress-Theme-v1.3.0.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-79%5D-Realteo-WordPress-Plugin-v1.2.3.txt", }, ], source: { discovery: "UNKNOWN", }, title: "Realteo < 1.2.4 - Unauthenticated Reflected Cross-Site Scripting (XSS)", x_generator: "WPScan CVE Generator", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "contact@wpscan.com", ID: "CVE-2021-24237", STATE: "PUBLIC", TITLE: "Realteo < 1.2.4 - Unauthenticated Reflected Cross-Site Scripting (XSS)", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Realteo", version: { version_data: [ { version_affected: "<", version_name: "1.2.4", version_value: "1.2.4", }, ], }, }, { product_name: "Findeo", version: { version_data: [ { version_affected: "<", version_name: "1.3.1", version_value: "1.3.1", }, ], }, }, ], }, vendor_name: "PureThemes", }, ], }, }, credit: [ { lang: "eng", value: "m0ze", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue.", }, ], }, generator: "WPScan CVE Generator", problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-79 Cross-site Scripting (XSS)", }, ], }, ], }, references: { reference_data: [ { name: "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e", refsource: "CONFIRM", url: "https://wpscan.com/vulnerability/087b27c4-289e-410f-af74-828a608a4e1e", }, { name: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", refsource: "MISC", url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { name: "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Findeo-WordPress-Theme-v1.3.0.txt", refsource: "MISC", url: "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Findeo-WordPress-Theme-v1.3.0.txt", }, { name: "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt", refsource: "MISC", url: "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-79]-Realteo-WordPress-Plugin-v1.2.3.txt", }, ], }, source: { discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", assignerShortName: "WPScan", cveId: "CVE-2021-24237", datePublished: "2021-04-22T21:00:50", dateReserved: "2021-01-14T00:00:00", dateUpdated: "2024-08-03T19:21:18.662Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-24238
Vulnerability from cvelistv5
Published
2021-04-22 21:00
Modified
2024-08-03 19:21
Severity ?
EPSS score ?
Summary
The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | PureThemes | Realteo |
Version: 1.2.4 < 1.2.4 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:21:18.692Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Realteo", vendor: "PureThemes", versions: [ { lessThan: "1.2.4", status: "affected", version: "1.2.4", versionType: "custom", }, ], }, { product: "Findeo", vendor: "PureThemes", versions: [ { lessThan: "1.3.1", status: "affected", version: "1.3.1", versionType: "custom", }, ], }, ], credits: [ { lang: "en", value: "m0ze", }, ], descriptions: [ { lang: "en", value: "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284 Improper Access Control", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-04-22T21:00:51", orgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", shortName: "WPScan", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", }, { tags: [ "x_refsource_MISC", ], url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt", }, { tags: [ "x_refsource_MISC", ], url: "https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt", }, ], source: { discovery: "UNKNOWN", }, title: "Realteo < 1.2.4 - Arbitrary Property Deletion via IDOR", x_generator: "WPScan CVE Generator", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "contact@wpscan.com", ID: "CVE-2021-24238", STATE: "PUBLIC", TITLE: "Realteo < 1.2.4 - Arbitrary Property Deletion via IDOR", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Realteo", version: { version_data: [ { version_affected: "<", version_name: "1.2.4", version_value: "1.2.4", }, ], }, }, { product_name: "Findeo", version: { version_data: [ { version_affected: "<", version_name: "1.3.1", version_value: "1.3.1", }, ], }, }, ], }, vendor_name: "PureThemes", }, ], }, }, credit: [ { lang: "eng", value: "m0ze", }, ], data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter.", }, ], }, generator: "WPScan CVE Generator", problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-284 Improper Access Control", }, ], }, ], }, references: { reference_data: [ { name: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", refsource: "MISC", url: "https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/", }, { name: "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", refsource: "CONFIRM", url: "https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5", }, { name: "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt", refsource: "MISC", url: "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Findeo-WordPress-Theme-v1.3.0.txt", }, { name: "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Realteo-WordPress-Plugin-v1.2.3.txt", refsource: "MISC", url: "https://m0ze.ru/vulnerability/[2021-03-20]-[WordPress]-[CWE-284]-Realteo-WordPress-Plugin-v1.2.3.txt", }, ], }, source: { discovery: "UNKNOWN", }, }, }, }, cveMetadata: { assignerOrgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", assignerShortName: "WPScan", cveId: "CVE-2021-24238", datePublished: "2021-04-22T21:00:51", dateReserved: "2021-01-14T00:00:00", dateUpdated: "2024-08-03T19:21:18.692Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }