CVE-2021-4339

The uListing plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in the "ulisting/includes/route.php" file on the /1/api/ulisting-user/search REST-API route in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to retrieve the list of all users and their email address in the database.
Configurations

Configuration 1 (hide)

cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*

History

13 Jun 2023, 14:56

Type Values Removed Values Added
CWE CWE-862
First Time Stylemixthemes
Stylemixthemes ulisting
CPE cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
References (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/0a6615fd-7c37-45d9-a657-0ba00df840e5?source=cve - (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/0a6615fd-7c37-45d9-a657-0ba00df840e5?source=cve - Third Party Advisory
References (MISC) https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vulnerabilities/ - (MISC) https://blog.nintechnet.com/wordpress-ulisting-plugin-fixed-multiple-critical-vulnerabilities/ - Exploit
References (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2456786%40ulisting&new=2456786%40ulisting&sfp_email=&sfph_mail= - (MISC) https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2456786%40ulisting&new=2456786%40ulisting&sfp_email=&sfph_mail= - Release Notes

07 Jun 2023, 02:44

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-07 02:15

Updated : 2023-12-10 15:01


NVD link : CVE-2021-4339

Mitre link : CVE-2021-4339

CVE.ORG link : CVE-2021-4339


JSON object : View

Products Affected

stylemixthemes

  • ulisting
CWE
CWE-862

Missing Authorization