Description
The Intuitive Custom Post Order WordPress plugin before 3.1.4 does not check for authorization in the update-menu-order ajax action, allowing any logged in user (with roles as low as Subscriber) to update the menu order
Published: 2023-02-21
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-51734 The Intuitive Custom Post Order WordPress plugin before 3.1.4 does not check for authorization in the update-menu-order ajax action, allowing any logged in user (with roles as low as Subscriber) to update the menu order
History

Wed, 12 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-862
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Intuitive Custom Post Order Project Intuitive Custom Post Order
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-03-12T16:14:17.795Z

Reserved: 2022-12-09T15:48:29.642Z

Link: CVE-2022-4385

cve-icon Vulnrichment

Updated: 2024-08-03T01:41:44.445Z

cve-icon NVD

Status : Modified

Published: 2023-02-21T09:15:10.650

Modified: 2025-03-12T17:15:36.817

Link: CVE-2022-4385

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses