CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-1072

High Severity
Seedprod
SVRS
68/100

CVSSv3
7.5/10

EPSS
0.00222/1

CVE-2024-1072 is a critical security vulnerability in the SeedProd Website Builder WordPress plugin, potentially allowing unauthorized data modification. Unauthenticated attackers can exploit this flaw to alter content on coming-soon, maintenance, login, and 404 pages. While CVSS gives this a score of 7.5, the SOCRadar Vulnerability Risk Score (SVRS) of 68 highlights that while not critical, there is a moderate risk. Versions up to 6.15.21 are vulnerable. This vulnerability arises from a missing capability check on the 'seedprod_lite_new_lpage' function, making websites susceptible to defacement and phishing attacks. Although version 6.15.22 attempts to fix this, it introduces a new bug, making it critical to update to version 6.15.23 immediately to mitigate the risk of exploitation. This underscores the importance of prompt patching and continuous monitoring of WordPress plugins.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:N
I:H
A:N
2024-02-05

2024-02-13
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-1072 is a vulnerability with a CVSS score of 0, indicating a low severity level. The description of the vulnerability is not yet available. However, the SOCRadar Vulnerability Risk Score (SVRS) of 30 suggests that the vulnerability poses a moderate risk and requires attention.

Key Insights:

  1. Threat Actors/APT Groups: There is no information available regarding specific threat actors or APT groups actively exploiting this vulnerability.

  2. Exploit Status: The exploit status is currently unknown. It is essential to monitor security advisories and updates to determine if active exploits have been published.

  3. CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued any warnings or advisories regarding CVE-2024-1072.

  4. In the Wild: There is no information available to confirm whether the vulnerability is actively exploited in the wild.

Mitigation Strategies:

  1. Apply Software Updates: Organizations should prioritize applying software updates and patches as soon as they become available. This is a crucial step in mitigating vulnerabilities and reducing the risk of exploitation.

  2. Implement Network Segmentation: Implementing network segmentation can help contain the impact of a potential breach by limiting the attacker's lateral movement within the network.

  3. Enable Intrusion Detection and Prevention Systems (IDPS): Deploying IDPS can help detect and prevent unauthorized access attempts and malicious activities on the network.

  4. Conduct Regular Security Audits: Regularly conducting security audits can help identify vulnerabilities and misconfigurations that could be exploited by attackers.

Additional Information:

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

No news found for this CVE

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppSeedprodwebsite_builder_by_seedprod

References

ReferenceLink
[email protected]https://plugins.trac.wordpress.org/changeset/3029567/coming-soon/trunk/app/lpage.php
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/78d7920b-3e20-43c7-a522-72bac824c2cb?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-862Missing AuthorizationThe software does not perform an authorization check when an actor attempts to access a resource or perform an action.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence