fkie_cve-2021-24752
Vulnerability from fkie_nvd
Published
2021-10-18 14:15
Modified
2024-11-21 05:53
Summary
Multiple Plugins from the CatchThemes vendor do not perform capability and CSRF checks in the ctp_switch AJAX action, which could allow any authenticated users, such as Subscriber to change the Essential Widgets WordPress plugin before 1.9, To Top WordPress plugin before 2.3, Header Enhancement WordPress plugin before 1.5, Generate Child Theme WordPress plugin before 1.6, Essential Content Types WordPress plugin before 1.9, Catch Web Tools WordPress plugin before 2.7, Catch Under Construction WordPress plugin before 1.4, Catch Themes Demo Import WordPress plugin before 1.6, Catch Sticky Menu WordPress plugin before 1.7, Catch Scroll Progress Bar WordPress plugin before 1.6, Social Gallery and Widget WordPress plugin before 2.3, Catch Infinite Scroll WordPress plugin before 1.9, Catch Import Export WordPress plugin before 1.9, Catch Gallery WordPress plugin before 1.7, Catch Duplicate Switcher WordPress plugin before 1.6, Catch Breadcrumb WordPress plugin before 1.7, Catch IDs WordPress plugin before 2.4's configurations.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:catchplugins:catch_scroll_progress_bar:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "253124C7-9B2A-459D-BE50-7FADDE1AF293",
              "versionEndExcluding": "1.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:catch_sticky_menu:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "CA821ABF-F29A-403B-AAD1-EE8E9BBE4816",
              "versionEndExcluding": "1.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:catch_themes_demo_import:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "CC8DD249-577D-4AE6-B7E1-4A1A646594E8",
              "versionEndExcluding": "1.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:catch_under_construction:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "92E45DA0-E11C-48E7-8B9D-86CD894559F7",
              "versionEndExcluding": "1.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:catch_web_tools:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "F6ECA854-4B7C-407F-9BF6-A7DD13461C89",
              "versionEndExcluding": "2.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:essential_content_types:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "517A7920-79F9-4664-BC8A-F0556C4DBC2C",
              "versionEndExcluding": "1.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:essential_widgets:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "F4BD97EC-02DF-4910-B01F-37193C8AD4CF",
              "versionEndExcluding": "1.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:generate_child_theme:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "E6F9F983-9824-4B6F-AC76-E3E6B2BC68A4",
              "versionEndExcluding": "1.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:header_enhancement:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "9A772196-8DDE-435E-8811-611FD3D55A19",
              "versionEndExcluding": "1.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:catchplugins:to_top:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "0C48AC04-D962-49C3-8678-DB4008D3D500",
              "versionEndExcluding": "2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple Plugins from the CatchThemes vendor do not perform capability and CSRF checks in the ctp_switch AJAX action, which could allow any authenticated users, such as Subscriber to change the Essential Widgets WordPress plugin before 1.9, To Top WordPress plugin before 2.3, Header Enhancement WordPress plugin before 1.5, Generate Child Theme WordPress plugin before 1.6, Essential Content Types WordPress plugin before 1.9, Catch Web Tools WordPress plugin before 2.7, Catch Under Construction WordPress plugin before 1.4, Catch Themes Demo Import WordPress plugin before 1.6, Catch Sticky Menu WordPress plugin before 1.7, Catch Scroll Progress Bar WordPress plugin before 1.6, Social Gallery and Widget WordPress plugin before 2.3, Catch Infinite Scroll WordPress plugin before 1.9, Catch Import Export WordPress plugin before 1.9, Catch Gallery WordPress plugin before 1.7, Catch Duplicate Switcher WordPress plugin before 1.6, Catch Breadcrumb WordPress plugin before 1.7, Catch IDs WordPress plugin before 2.4\u0027s configurations."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples plugins del proveedor CatchThemes no llevan a cabo comprobaciones de capacidad y CSRF en la acci\u00f3n ctp_switch AJAX, que podr\u00eda permitir a cualquier usuario autenticado, como el suscriptor cambiar el plugin Essential Widgets de WordPress versiones anteriores a 1.9, To Top de WordPress versiones anteriores a 2. 3, el plugin Header Enhancement de WordPress versiones anteriores a 1.5, el plugin Generate Child Theme de WordPress versiones anteriores a 1.6, el plugin Essential Content Types de WordPress versiones anteriores a 1.9, el plugin Catch Web Tools de WordPress versiones anteriores a 2.7, el plugin Catch Under Construction de WordPress versiones anteriores a 1. 4, el plugin Catch Themes Demo Import de WordPress versiones anteriores a 1.6, el plugin Catch Sticky Menu de WordPress versiones anteriores a 1.7, el plugin Catch Scroll Progress Bar de WordPress versiones anteriores a 1.6, l plugin Social Gallery and Widget de WordPress versiones anteriores a 2.3, el plugin Catch Infinite Scroll de WordPress versiones anteriores a 1. 9, el plugin Catch Import Export de WordPress versiones anteriores a 1.9, el plugin Catch Gallery de WordPress versiones anteriores a 1.7, el plugin Catch Duplicate Switcher de WordPress versiones anteriores a 1.6, el plugin Catch Breadcrumb de WordPress versiones anteriores a 1.7, el plugin Catch IDs de WordPress versiones anteriores a las configuraciones de 2.4"
    }
  ],
  "id": "CVE-2021-24752",
  "lastModified": "2024-11-21T05:53:41.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-18T14:15:10.040",
  "references": [
    {
      "source": "contact@wpscan.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://wpscan.com/vulnerability/181a729e-fffe-457c-9e8d-a4343fd2e630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://wpscan.com/vulnerability/181a729e-fffe-457c-9e8d-a4343fd2e630"
    }
  ],
  "sourceIdentifier": "contact@wpscan.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "contact@wpscan.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.