CVE-2026-2917

MEDIUM
中文标题:
(暂无数据)
英文标题:
The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Referenc
CVSS分数: 5.4
发布时间: 2026-03-11 08:16:03
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v1
漏洞描述
中文描述:

(暂无数据)

英文描述:

The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can('edit_posts')` (a general capability) without performing object-level authorization such as `current_user_can('edit_post', $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type by obtaining a valid clone nonce from their own posts and changing the `post_id` parameter to target other users' content. The clone operation copies the full post content, all post metadata (including potentially sensitive widget configurations and API tokens), and taxonomies into a new draft owned by the attacker.

CWE类型:
CWE-639
标签:
(暂无数据)
受影响产品
暂无受影响产品信息
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
CVSS评分详情
5.4
MEDIUM
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CVSS版本: 3.1
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2026-03-11 08:16:03
修改时间:
2026-03-11 13:52:47
创建时间:
2026-03-12 06:00:02
更新时间:
2026-03-12 06:00:02
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
NVD nvd_CVE-2026-2917 2026-03-12 02:00:06 2026-03-11 22:00:02
版本与语言
当前版本: v1
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
暂无变更历史