Critical Vulnerabilities affecting WordPress (CVE-2024-5522, CVE-2024-5150, CVE-2024-3412)

Imechapishwa: May 31, 2024 19:19

Advisory No: TZCERT/SA/2024/05/31-1

Source: Wordfence

Software Affected:  html5-video-player,  login-with-phone-number,  wp-staging

Overview

Description

Advisory No: TZCERT/SA/2024/05/31-1

Date of First Release: 31st May 2024

Source: Wordfence

Software Affected:  html5-video-player,  login-with-phone-number,  wp-staging

Overview:

WordPress is vulnerable to three critical vulnerabilities. The attackers can leverage the vulnerabilities to take control of the affected system.

Description:

Three WordPress plugins namely html5-video-player,  login-with-phone-number,  wp-staging are affected by the vulnerabilities tracked as CVE-2024-5522, CVE-2024-5150 and CVE-2024-3412 respectively. Reasons for the flaws include insufficient escaping and validation of user-supplied data. The attackers can exploit the vulnerabilities to gain access to the vulnerable system and access to sensitive information.

Impact:

Successful exploitation of these vulnerabilities may allow an attacker to take control of the vulnerable system

Solution:

WordPress has released security patches for these vulnerabilities. Users and administrators are encouraged to apply necessary updates.

References:

  1. https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/html5-video-player/html5-video-player-2526-unauthenticated-sql-injection
  2. https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/login-with-phone-number/login-with-phone-number-1726-authentication-bypass-due-to-missing-empty-value-check
  3. https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wp-staging/wp-staging-wordpress-backup-plugin-migration-backup-restore-343-authenticated-admin-arbitrary-file-upload

Impact

Solution

References

Subscribe To TZ - CERT Newsletter

A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.

Subscribe
Ripoti Tukio