CVE-2026-2879

MEDIUM
中文标题:
(暂无数据)
英文标题:
The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions
CVSS分数: 5.4
发布时间: 2026-03-13 19:54:34
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v1
漏洞描述
中文描述:

(暂无数据)

英文描述:

The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2. This is due to missing validation on the `id` parameter in the `create()` method of the `GetGenieChat` REST API endpoint. The method accepts a user-controlled post ID and, when a post with that ID exists, calls `wp_update_post()` without verifying that the current user owns the post or that the post is of the expected `getgenie_chat` type. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite arbitrary posts owned by any user — including Administrators — effectively destroying the original content by changing its `post_type` to `getgenie_chat` and reassigning `post_author` to the attacker.

CWE类型:
CWE-639
标签:
(暂无数据)
受影响产品
暂无受影响产品信息
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
security@wordfence.com OTHER
nvd.nist.gov
访问
CVSS评分详情
5.4
MEDIUM
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
CVSS版本: 3.1
机密性
NONE
完整性
LOW
可用性
LOW
时间信息
发布时间:
2026-03-13 19:54:34
修改时间:
2026-03-13 19:54:34
创建时间:
2026-03-14 06:00:01
更新时间:
2026-03-14 06:00:01
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
NVD nvd_CVE-2026-2879 2026-03-14 02:00:05 2026-03-13 22:00:01
版本与语言
当前版本: v1
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
暂无变更历史