{"containers":{"cna":{"affected":[{"product":"Tab – Accordion, FAQ","vendor":"Unknown","versions":[{"lessThan":"1.3.2","status":"affected","version":"1.3.2","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Brandon Roldan"}],"descriptions":[{"lang":"en","value":"All AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-862","description":"CWE-862 Missing Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-01-03T12:49:05.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900"}],"source":{"discovery":"EXTERNAL"},"title":"Tab - Accordion, FAQ < 1.3.2 - Unauthenticated AJAX Calls","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24831","STATE":"PUBLIC","TITLE":"Tab - Accordion, FAQ < 1.3.2 - Unauthenticated AJAX Calls"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Tab – Accordion, FAQ","version":{"version_data":[{"version_affected":"<","version_name":"1.3.2","version_value":"1.3.2"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Brandon Roldan"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"All AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-862 Missing Authorization"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900","refsource":"MISC","url":"https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:42:17.210Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24831","datePublished":"2022-01-03T12:49:05.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:42:17.210Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}