
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical authentication bypass vulnerability (CVE-2024-54336) was discovered in the WordPress Projectopia plugin affecting versions up to 5.1.7. The vulnerability was reported by Muhamad Agil Fachrian on October 29, 2024, and was publicly disclosed on December 11, 2024. This security flaw allows for authentication bypass using an alternate path or channel in the Projectopia plugin (Patchstack).
The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The issue is classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel). The vulnerability specifically affects the pto_reset_password() functionality in the plugin (Patchstack).
This vulnerability is considered highly dangerous and is expected to become mass exploited. It can be abused by malicious actors to perform actions that should only be executable by higher privileged users, potentially leading to admin access to the website. The vulnerability requires only subscriber-level privileges to exploit (Patchstack).
Users are strongly advised to update to Projectopia version 5.1.8 or later, which contains the fix for this vulnerability. For users unable to update immediately, Patchstack has issued a virtual patch to mitigate this issue by blocking potential attacks until the update can be applied (Patchstack).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."