{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-1645","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2024-02-19T21:19:29.032Z","datePublished":"2024-03-11T21:30:57.333Z","dateUpdated":"2026-04-08T16:45:55.676Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T16:45:55.676Z"},"affected":[{"vendor":"ndijkstra","product":"Mollie Forms","versions":[{"version":"0","status":"affected","lessThanOrEqual":"2.6.3","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The Mollie Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the exportRegistrations function in all versions up to, and including, 2.6.3. This makes it possible for authenticated attackers, with subscriber access or higher, to export payment data collected by this plugin."}],"title":"Mollie Forms <= 2.6.3 - Missing Authorization","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/353c244f-6d5d-47d6-988e-33da722a02f9?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/mollie-forms/trunk/classes/Admin.php#L904"},{"url":"https://plugins.trac.wordpress.org/changeset/3046896/mollie-forms/trunk/classes/Admin.php"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-862 Missing Authorization","cweId":"CWE-862","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM"}}],"credits":[{"lang":"en","type":"finder","value":"Lucio Sá"}],"timeline":[{"time":"2024-03-11T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:48:20.667Z"},"title":"CVE Program Container","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/353c244f-6d5d-47d6-988e-33da722a02f9?source=cve","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/browser/mollie-forms/trunk/classes/Admin.php#L904","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/changeset/3046896/mollie-forms/trunk/classes/Admin.php","tags":["x_transferred"]}]},{"affected":[{"vendor":"wobbie","product":"mollie_forms","cpes":["cpe:2.3:a:wobbie:mollie_forms:-:*:*:*:*:wordpress:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"2.6.3","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-03-12T16:17:39.123117Z","id":"CVE-2024-1645","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-27T20:52:12.631Z"}}]}}