Description

The WP Easy Post Types plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 1.4.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete plugin options and posts.

INFO

Published Date :

2024-10-18T07:35:26.905Z

Last Modified :

2026-04-08T17:25:07.056Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2024-10078 vulnerability.

Vendors Products
Newsignature
  • Wp Easy Post Types
Wp Easy Post Types Project
  • Wp Easy Post Types
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-10078.

URL Resource
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L111 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L112 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L113 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L114 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L115 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L116 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L117 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L118 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L119 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L120 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L121 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L122 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L123 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L124 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L125 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L126 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L127 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L128 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L129 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L130 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L131 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L132 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L133 cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/easy-post-types/tags/1.4.4/custom-type.php#L134 cve-icon cve-icon
https://www.wordfence.com/threat-intel/vulnerabilities/id/d12c4b1c-23d0-430f-a6ea-0a3ab487ed10?source=cve cve-icon cve-icon

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact