CVE-2024-11024

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.6. This is due to the plugin not properly validating a user's password reset code prior to updating their password. This makes it possible for unauthenticated attackers, with knowledge of a user's email address, to reset the user's password and gain access to their account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:*

History

05 Jun 2025, 17:01

Type Values Removed Values Added
First Time Apppresser
Apppresser apppresser
CPE cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/changeset/3192531/apppresser - () https://plugins.trac.wordpress.org/changeset/3192531/apppresser - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/43cb0399-4add-43d5-863c-30e11803bd90?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/43cb0399-4add-43d5-863c-30e11803bd90?source=cve - Third Party Advisory

Information

Published : 2024-11-26 11:21

Updated : 2025-06-05 17:01


NVD link : CVE-2024-11024

Mitre link : CVE-2024-11024

CVE.ORG link : CVE-2024-11024


JSON object : View

Products Affected

apppresser

  • apppresser
CWE
CWE-230

Improper Handling of Missing Values