CVE-2026-3453

HIGH
中文标题:
(暂无数据)
英文标题:
The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versi
CVSS分数: 8.1
发布时间: 2026-03-11 03:15:56
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v1
漏洞描述
中文描述:

(暂无数据)

英文描述:

The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.16.11. This is due to missing ownership validation on the change_plan_sub_id parameter in the process_checkout() function. The ppress_process_checkout AJAX handler accepts a user-controlled subscription ID intended for plan upgrades, loads the subscription record, and cancels/expires it without verifying the subscription belongs to the requesting user. This makes it possible for authenticated attackers, with Subscriber-level access and above, to cancel and expire any other user's active subscription via the change_plan_sub_id parameter during checkout, causing immediate loss of paid access for victims.

CWE类型:
CWE-639
标签:
(暂无数据)
受影响产品
暂无受影响产品信息
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
CVSS评分详情
8.1
HIGH
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CVSS版本: 3.1
机密性
NONE
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2026-03-11 03:15:56
修改时间:
2026-03-11 13:52:47
创建时间:
2026-03-12 06:00:03
更新时间:
2026-03-12 06:00:03
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
NVD nvd_CVE-2026-3453 2026-03-12 02:00:06 2026-03-11 22:00:03
版本与语言
当前版本: v1
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
暂无变更历史