{"containers":{"cna":{"affected":[{"product":"Store Locator Plus for WordPress","vendor":"Store Locator Plus","versions":[{"lessThanOrEqual":"5.5.14","status":"affected","version":"5.5.14","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Chloe Chamberland"}],"descriptions":[{"lang":"en","value":"There is functionality in the Store Locator Plus for WordPress plugin through 5.5.14 that made it possible for authenticated users to update their user meta data to become an administrator on any site using the plugin."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-05-17T16:48:52.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://wpscan.com/vulnerability/078e93cd-7cf2-4e23-8171-58d44e354d62"},{"tags":["x_refsource_MISC"],"url":"https://www.wordfence.com/blog/2021/04/severe-unpatched-vulnerabilities-leads-to-closure-of-store-locator-plus-plugin/"}],"source":{"discovery":"UNKNOWN"},"title":"Store Locator Plus <= 5.5.14 - Authenticated Privilege Escalation","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24289","STATE":"PUBLIC","TITLE":"Store Locator Plus <= 5.5.14 - Authenticated Privilege Escalation"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Store Locator Plus for WordPress","version":{"version_data":[{"version_affected":"<=","version_name":"5.5.14","version_value":"5.5.14"}]}}]},"vendor_name":"Store Locator Plus"}]}},"credit":[{"lang":"eng","value":"Chloe Chamberland"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"There is functionality in the Store Locator Plus for WordPress plugin through 5.5.14 that made it possible for authenticated users to update their user meta data to become an administrator on any site using the plugin."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-269 Improper Privilege Management"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/078e93cd-7cf2-4e23-8171-58d44e354d62","refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/078e93cd-7cf2-4e23-8171-58d44e354d62"},{"name":"https://www.wordfence.com/blog/2021/04/severe-unpatched-vulnerabilities-leads-to-closure-of-store-locator-plus-plugin/","refsource":"MISC","url":"https://www.wordfence.com/blog/2021/04/severe-unpatched-vulnerabilities-leads-to-closure-of-store-locator-plus-plugin/"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:28:23.205Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://wpscan.com/vulnerability/078e93cd-7cf2-4e23-8171-58d44e354d62"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.wordfence.com/blog/2021/04/severe-unpatched-vulnerabilities-leads-to-closure-of-store-locator-plus-plugin/"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24289","datePublished":"2021-05-17T16:48:52.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:28:23.205Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}