CVE-2024-6500
WordPress vulnerability analysis and mitigation

Overview

CVE-2024-6500 affects the InPost for WooCommerce plugin (versions up to 1.4.0) and InPost PL plugin (versions up to 1.4.4) for WordPress. The vulnerability was discovered and reported by Wordfence, with the initial disclosure on August 16, 2024. The vulnerability stems from a missing capability check on the 'parse_request' function, which exposes these WordPress plugins to unauthorized access and data deletion risks (NVD).

Technical details

The vulnerability is classified as CWE-862 (Missing Authorization) with a CVSS v3.1 Base Score of 10.0 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H). The security flaw exists in the parse_request function implementation, which lacks proper capability checks, allowing unauthorized access to sensitive functionalities (NVD).

Impact

The vulnerability allows unauthenticated attackers to read and delete arbitrary files on Windows servers. On Linux servers, while all files can be read, only files within the WordPress installation can be deleted. This presents a significant security risk for websites using the affected plugins (NVD).

Mitigation and workarounds

For the InPost PL plugin, updating to version 1.4.5 or later addresses this vulnerability. However, for the InPost for WooCommerce plugin, there are currently no known patch versions available (ASEC).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management