CVE-2024-10527

Name
CVE-2024-10527
Description
The Spacer plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the motech_spacer_callback() function in all versions up to, and including, 3.0.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view limited setting information.
NVD Severity
low
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security@wordfence.com https://plugins.trac.wordpress.org/browser/spacer/tags/3.0.7/index.php#L85
security@wordfence.com https://www.wordfence.com/threat-intel/vulnerabilities/id/112ece28-27ac-4d3c-b302-7acab43390fb?source=cve

Match rules

CPE URI Source package Min version Max version
spacer >= 0 <= 3.0.7

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
spacer edge-community 0.5.0-r0 qaqland <qaq@qaq.land> possibly vulnerable
spacer 3.23-community 0.5.0-r0 qaqland <qaq@qaq.land> possibly vulnerable