Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49055 | The Frontend Dashboard plugin for WordPress is vulnerable to unauthorized code execution due to insufficient filtering on callable methods/functions via the ajax_request() function in all versions up to, and including, 2.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to call arbitrary functions that can be leverage for privilege escalation by changing user's passwords. |
Thu, 26 Sep 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:buffercode:frontend_dashboard:*:*:*:*:*:wordpress:*:* |
Tue, 10 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Buffercode
Buffercode frontend Dashboard |
|
| CPEs | cpe:2.3:a:buffercode:frontend_dashboard:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Buffercode
Buffercode frontend Dashboard |
|
| Metrics |
ssvc
|
Tue, 10 Sep 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Frontend Dashboard plugin for WordPress is vulnerable to unauthorized code execution due to insufficient filtering on callable methods/functions via the ajax_request() function in all versions up to, and including, 2.2.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to call arbitrary functions that can be leverage for privilege escalation by changing user's passwords. | |
| Title | Frontend Dashboard <= 2.2.4 - Authenticated (Subscriber+) Arbitrary Function Call | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:02:54.880Z
Reserved: 2024-08-28T17:24:05.590Z
Link: CVE-2024-8268
Updated: 2024-09-10T13:43:03.563Z
Status : Analyzed
Published: 2024-09-10T03:15:03.690
Modified: 2024-09-26T16:15:31.053
Link: CVE-2024-8268
No data.
OpenCVE Enrichment
No data.
EUVD