Download of Code Without Integrity Check Affecting johnbillion/wp-crontrol package, versions <1.16.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PHP-JOHNBILLIONWPCRONTROL-6501724
  • published27 Mar 2024
  • disclosed25 Mar 2024
  • creditjohnbillion

Introduced: 25 Mar 2024

CVE-2024-28850  (opens in a new tab)
CWE-494  (opens in a new tab)

How to fix?

Upgrade johnbillion/wp-crontrol to version 1.16.2 or higher.

Overview

johnbillion/wp-crontrol is a package that allows you to take control of the cron events on your WordPress website.

Affected versions of this package are vulnerable to Download of Code Without Integrity Check due to the feature that allows administrative users to create events in the WP-Cron system for storing and executing PHP code under specific security permissions. This feature, while not vulnerable on its own, could potentially be exploited for arbitrary code execution if combined with another vulnerability, such as SQL injection, that allows for the manipulation of the wp_options table or the execution of arbitrary actions, filters, or functions with controlled parameters.

Note

This is only exploitable if the site is vulnerable to a writable SQL injection vulnerability in any plugin, theme, or WordPress core, the site's database is compromised at the hosting level, the site is vulnerable to a method of updating arbitrary options in the wp_options table, or the site is vulnerable to a method of triggering an arbitrary action, filter, or function with control of the parameters.

CVSS Base Scores

version 3.1