CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-9235

Critical Severity
Mapster
SVRS
77/100

CVSSv3
8.8/10

EPSS
0.00209/1

CVE-2024-9235 affects the Mapster WP Maps plugin for WordPress, enabling privilege escalation. Authenticated attackers with contributor access can modify WordPress options due to a lack of capability checks in the mapster_wp_maps_set_option_from_js() function up to version 1.5.0. The vulnerability allows attackers to change the default user role to administrator and enable user registration, granting them admin access. Although the CVSS score is 8.8, the SOCRadar Vulnerability Risk Score (SVRS) of 77 suggests it is nearing critical severity. This means exploitation may be imminent. Immediate patching is advised to prevent unauthorized access and maintain site security. The vulnerability poses a high risk due to the potential for complete site takeover.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:U
C:H
I:H
A:H
2024-10-25

2024-11-05

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-9235 | Mapster WP Maps Plugin up to 1.5.0 on WordPress Options Update improper authentication
vuldb.com2024-10-25
CVE-2024-9235 | Mapster WP Maps Plugin up to 1.5.0 on WordPress Options Update improper authentication | A vulnerability classified as critical has been found in Mapster WP Maps Plugin up to 1.5.0 on WordPress. Affected is an unknown function of the component Options Update Handler. The manipulation leads to improper authentication. This vulnerability is traded as CVE-2024-9235. It is possible to launch
vuldb.com
rss
forum
news

Social Media

[CVE-2024-9235: HIGH] Mapster WP Maps plugin for WordPress has a vulnerability allowing unauthorized data modification, leading to privilege escalation on versions up to 1.5.0. Attackers with contributor access ca...#cybersecurity,#vulnerability https://t.co/IiqPbFULva https://t.co/yP1o7BgHuV
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
AppMapstermapster_wp_maps

References

ReferenceLink
[email protected]https://github.com/WordPressBugBounty/plugins-mapster-wp-maps/blob/009ff350f7fee0788c6d8a735af03e21b132c983/mapster-wp-maps/admin/api/class-mapster-wordpress-maps-api.php#L12
[email protected]https://plugins.trac.wordpress.org/changeset/3161051/mapster-wp-maps/tags/1.5.0/admin/api/class-mapster-wordpress-maps-api.php?old=3154048&old_path=mapster-wp-maps%2Ftags%2F1.4.1%2Fadmin%2Fapi%2Fclass-mapster-wordpress-maps-api.php
[email protected]https://plugins.trac.wordpress.org/changeset/3173973
[email protected]https://wordpress.org/plugins/mapster-wp-maps/
[email protected]https://www.wordfence.com/threat-intel/vulnerabilities/id/b81c2990-68d1-4d45-9724-262ec017caf1?source=cve

CWE Details

CWE IDCWE NameDescription
CWE-285Improper AuthorizationThe software does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence