Vulnerabilites related to Unknown - Advanced Custom Fields Pro
CVE-2024-4565 (GCVE-0-2024-4565)
Vulnerability from cvelistv5
Published
2024-06-20 06:00
Modified
2024-08-01 20:47
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Advanced Custom Fields (ACF) WordPress plugin before 6.3, Advanced Custom Fields Pro WordPress plugin before 6.3 allows you to display custom field values for any post via shortcode without checking for the correct access
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Unknown | Advanced Custom Fields (ACF) |
Version: 0 ≤ |
||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:wpengine:advanced_custom_field_pro:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "advanced_custom_field_pro", "vendor": "wpengine", "versions": [ { "lessThan": "6.3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:wpengine:advanced_custom_fields:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "advanced_custom_fields", "vendor": "wpengine", "versions": [ { "lessThan": "6.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-4565", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-20T13:40:36.821631Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-20T13:42:56.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:47:40.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/430224c4-d6e3-4ca8-b1bc-b2229a9bcf12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Advanced Custom Fields (ACF)", "vendor": "Unknown", "versions": [ { "lessThan": "6.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Advanced Custom Fields Pro", "vendor": "Unknown", "versions": [ { "lessThan": "6.3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Scott Kingsley Clark" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Advanced Custom Fields (ACF) WordPress plugin before 6.3, Advanced Custom Fields Pro WordPress plugin before 6.3 allows you to display custom field values for any post via shortcode without checking for the correct access" } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-20T06:00:02.546Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/430224c4-d6e3-4ca8-b1bc-b2229a9bcf12/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Advanced Custom Fields \u003c 6.3 - Contributor+ Custom Field Access", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2024-4565", "datePublished": "2024-06-20T06:00:02.546Z", "dateReserved": "2024-05-06T19:04:45.951Z", "dateUpdated": "2024-08-01T20:47:40.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24241 (GCVE-0-2021-24241)
Vulnerability from cvelistv5
Published
2021-04-22 21:00
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross-site Scripting (XSS)
Summary
The Advanced Custom Fields Pro WordPress plugin before 5.9.1 did not properly escape the generated update URL when outputting it in an attribute, leading to a reflected Cross-Site Scripting issue in the update settings page.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Advanced Custom Fields Pro |
Version: 5.9.1 < 5.9.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:18.775Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/jdordonezn/Reflected-XSS-in-WordPress-for-ACF-PRO-before-5.9.1-plugin/issues/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.advancedcustomfields.com/blog/acf-5-9-1-release/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Advanced Custom Fields Pro", "vendor": "Unknown", "versions": [ { "lessThan": "5.9.1", "status": "affected", "version": "5.9.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Juan David Ordo\u00f1ez Noriega" } ], "descriptions": [ { "lang": "en", "value": "The Advanced Custom Fields Pro WordPress plugin before 5.9.1 did not properly escape the generated update URL when outputting it in an attribute, leading to a reflected Cross-Site Scripting issue in the update settings page." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T21:00:51", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/jdordonezn/Reflected-XSS-in-WordPress-for-ACF-PRO-before-5.9.1-plugin/issues/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.advancedcustomfields.com/blog/acf-5-9-1-release/" } ], "source": { "discovery": "UNKNOWN" }, "title": "Advanced Custom Field Pro \u003c 5.9.1 - Reflected Cross-Site Scripting (XSS)", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24241", "STATE": "PUBLIC", "TITLE": "Advanced Custom Field Pro \u003c 5.9.1 - Reflected Cross-Site Scripting (XSS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Advanced Custom Fields Pro", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.9.1", "version_value": "5.9.1" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Juan David Ordo\u00f1ez Noriega" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Advanced Custom Fields Pro WordPress plugin before 5.9.1 did not properly escape the generated update URL when outputting it in an attribute, leading to a reflected Cross-Site Scripting issue in the update settings page." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f", "refsource": "CONFIRM", "url": "https://wpscan.com/vulnerability/d1e9c995-37bd-4952-b88e-945e02e3c83f" }, { "name": "https://github.com/jdordonezn/Reflected-XSS-in-WordPress-for-ACF-PRO-before-5.9.1-plugin/issues/1", "refsource": "MISC", "url": "https://github.com/jdordonezn/Reflected-XSS-in-WordPress-for-ACF-PRO-before-5.9.1-plugin/issues/1" }, { "name": "https://www.advancedcustomfields.com/blog/acf-5-9-1-release/", "refsource": "MISC", "url": "https://www.advancedcustomfields.com/blog/acf-5-9-1-release/" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24241", "datePublished": "2021-04-22T21:00:51", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:21:18.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-9529 (GCVE-0-2024-9529)
Vulnerability from cvelistv5
Published
2024-11-15 06:00
Modified
2024-11-15 18:38
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The Secure Custom Fields WordPress plugin before 6.3.9, Secure Custom Fields WordPress plugin before 6.3.6.3, Advanced Custom Fields Pro WordPress plugin before 6.3.9 does not prevent users from running arbitrary functions through its setting import functionalities, which could allow high privilege users such as admin to run arbitrary PHP functions.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Unknown | Secure Custom Fields |
Version: 6.3.7 ≤ |
|||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:wpengine:advanced_custom_field_pro:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "advanced_custom_field_pro", "vendor": "wpengine", "versions": [ { "lessThan": "6.3.9", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:wpengine:advanced_custom_fields:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "advanced_custom_fields", "vendor": "wpengine", "versions": [ { "lessThan": "6.3.6.3", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThan": "6.3.9", "status": "affected", "version": "6.3.7", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-9529", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T18:32:21.308252Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:38:37.432Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Secure Custom Fields", "vendor": "Unknown", "versions": [ { "lessThan": "6.3.9", "status": "affected", "version": "6.3.7", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Secure Custom Fields", "vendor": "Unknown", "versions": [ { "lessThan": "6.3.6.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Advanced Custom Fields Pro", "vendor": "Unknown", "versions": [ { "lessThan": "6.3.9", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Automattic Security Team" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Secure Custom Fields WordPress plugin before 6.3.9, Secure Custom Fields WordPress plugin before 6.3.6.3, Advanced Custom Fields Pro WordPress plugin before 6.3.9 does not prevent users from running arbitrary functions through its setting import functionalities, which could allow high privilege users such as admin to run arbitrary PHP functions." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-15T06:00:08.369Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/dd3cc8d8-4dff-47f9-b036-5d09f2c7e5f2/" } ], "source": { "discovery": "EXTERNAL" }, "title": "Secure Custom Fields \u003c 6.3.6.3 - Admin+ Remote Code Execution", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2024-9529", "datePublished": "2024-11-15T06:00:08.369Z", "dateReserved": "2024-10-04T15:01:44.589Z", "dateUpdated": "2024-11-15T18:38:37.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }