We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-9305

AppPresser – Mobile App Framework <= 4.4.4 - Privilege Escalation and Account Takeover via Weak OTP



Description

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.4. This is due to the appp_reset_password() and validate_reset_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.

Reserved 2024-09-27 | Published 2024-10-16 | Updated 2024-10-16 | Assigner Wordfence


HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-640 Weak Password Recovery Mechanism for Forgotten Password

Product status

Default status
unaffected

*
affected

Timeline

2024-10-15:Disclosed

Credits

wesley finder

References

www.wordfence.com/...-a98d-4eb4-a287-f523e434688b?source=cve

plugins.trac.wordpress.org/...inc/AppPresser_Ajax_Extras.php

plugins.trac.wordpress.org/.../inc/AppPresser_WPAPI_Mods.php

plugins.trac.wordpress.org/...ppresser&sfp_email=&sfph_mail=

cve.org (CVE-2024-9305)

nvd.nist.gov (CVE-2024-9305)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-9305

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.