{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-6624","assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","state":"PUBLISHED","assignerShortName":"Wordfence","dateReserved":"2024-07-09T17:32:52.204Z","datePublished":"2024-07-11T06:43:13.276Z","dateUpdated":"2026-04-08T17:13:06.826Z"},"containers":{"cna":{"providerMetadata":{"orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence","dateUpdated":"2026-04-08T17:13:06.826Z"},"affected":[{"vendor":"parorrey","product":"JSON API User","versions":[{"version":"0","status":"affected","lessThanOrEqual":"3.9.3","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed."}],"title":"JSON API User <= 3.9.3 - Unauthenticated Privilege Escalation","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a26f60-5912-4d4a-8ef8-e4357c1fb1ff?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/json-api-user/trunk/controllers/User.php#L51"},{"url":"https://plugins.trac.wordpress.org/browser/json-api-user/trunk/controllers/User.php#L187"},{"url":"https://plugins.trac.wordpress.org/changeset/3115185/"}],"problemTypes":[{"descriptions":[{"lang":"en","description":"CWE-269 Improper Privilege Management","cweId":"CWE-269","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL"}}],"credits":[{"lang":"en","type":"finder","value":"Thanh Nam Tran"}],"timeline":[{"time":"2024-07-10T00:00:00.000Z","lang":"en","value":"Disclosed"}]},"adp":[{"affected":[{"vendor":"parorrey","product":"json_api_user","cpes":["cpe:2.3:a:parorrey:json_api_user:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThanOrEqual":"3.9.3","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-12T14:40:34.472424Z","id":"CVE-2024-6624","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-24T20:15:29.975Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:41:04.397Z"},"title":"CVE Program Container","references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a26f60-5912-4d4a-8ef8-e4357c1fb1ff?source=cve","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/browser/json-api-user/trunk/controllers/User.php#L51","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/browser/json-api-user/trunk/controllers/User.php#L187","tags":["x_transferred"]},{"url":"https://plugins.trac.wordpress.org/changeset/3115185/","tags":["x_transferred"]}]}]}}