CVE-2024-1733

The Word Replacer Pro plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the word_replacer_ultra() function in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to update arbitrary content on the affected WordPress site.
Configurations

Configuration 1 (hide)

cpe:2.3:a:charlestsmith:word_replacer_pro:1.0:*:*:*:*:wordpress:*:*

History

18 Apr 2025, 15:32

Type Values Removed Values Added
CWE CWE-862
CPE cpe:2.3:a:charlestsmith:word_replacer_pro:1.0:*:*:*:*:wordpress:*:*
First Time Charlestsmith
Charlestsmith word Replacer Pro
References () https://plugins.trac.wordpress.org/browser/word-replacer-ultra/trunk/inc/word-replacer-ultra-ajax.php#L16 - () https://plugins.trac.wordpress.org/browser/word-replacer-ultra/trunk/inc/word-replacer-ultra-ajax.php#L16 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/1da53718-c2a2-45d0-ad43-daff3c68342d?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/1da53718-c2a2-45d0-ad43-daff3c68342d?source=cve - Third Party Advisory

Information

Published : 2024-03-16 06:15

Updated : 2025-04-18 15:32


NVD link : CVE-2024-1733

Mitre link : CVE-2024-1733

CVE.ORG link : CVE-2024-1733


JSON object : View

Products Affected

charlestsmith

  • word_replacer_pro
CWE
CWE-862

Missing Authorization