CVE-2024-9531

The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'mvx_sent_deactivation_request' function in all versions up to, and including, 4.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send a canned email to the site's administrator asking to delete the profile of an arbitrary vendor.
Configurations

Configuration 1 (hide)

cpe:2.3:a:multivendorx:multivendorx:*:*:*:*:*:wordpress:*:*

History

05 Jun 2025, 16:56

Type Values Removed Values Added
First Time Multivendorx multivendorx
Multivendorx
CPE cpe:2.3:a:multivendorx:multivendorx:*:*:*:*:*:wordpress:*:*
References () https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/trunk/classes/class-mvx-ajax.php#L3780 - () https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/trunk/classes/class-mvx-ajax.php#L3780 - Product
References () https://plugins.trac.wordpress.org/changeset/3173238/dc-woocommerce-multi-vendor/trunk/classes/class-mvx-ajax.php?contextall=1&old=3168957&old_path=%2Fdc-woocommerce-multi-vendor%2Ftrunk%2Fclasses%2Fclass-mvx-ajax.php - () https://plugins.trac.wordpress.org/changeset/3173238/dc-woocommerce-multi-vendor/trunk/classes/class-mvx-ajax.php?contextall=1&old=3168957&old_path=%2Fdc-woocommerce-multi-vendor%2Ftrunk%2Fclasses%2Fclass-mvx-ajax.php - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/5af1063c-615e-4196-9fa6-960c008544c4?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/5af1063c-615e-4196-9fa6-960c008544c4?source=cve - Third Party Advisory
CWE CWE-862

Information

Published : 2024-10-24 08:15

Updated : 2025-06-05 16:56


NVD link : CVE-2024-9531

Mitre link : CVE-2024-9531

CVE.ORG link : CVE-2024-9531


JSON object : View

Products Affected

multivendorx

  • multivendorx
CWE
CWE-285

Improper Authorization

CWE-862

Missing Authorization