The Word Replacer Pro plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the word_replacer_ultra() function in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to update arbitrary content on the affected WordPress site.
References
Configurations
History
18 Apr 2025, 15:32
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-862 | |
CPE | cpe:2.3:a:charlestsmith:word_replacer_pro:1.0:*:*:*:*:wordpress:*:* | |
First Time |
Charlestsmith
Charlestsmith word Replacer Pro |
|
References | () https://plugins.trac.wordpress.org/browser/word-replacer-ultra/trunk/inc/word-replacer-ultra-ajax.php#L16 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/1da53718-c2a2-45d0-ad43-daff3c68342d?source=cve - Third Party Advisory |
Information
Published : 2024-03-16 06:15
Updated : 2025-04-18 15:32
NVD link : CVE-2024-1733
Mitre link : CVE-2024-1733
CVE.ORG link : CVE-2024-1733
JSON object : View
Products Affected
charlestsmith
- word_replacer_pro
CWE
CWE-862
Missing Authorization