{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-15T03:28:41.882","vulnerabilities":[{"cve":{"id":"CVE-2021-24238","sourceIdentifier":"contact@wpscan.com","published":"2021-04-22T21:15:09.797","lastModified":"2024-11-21T05:52:39.760","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter."},{"lang":"es","value":"El plugin Realteo WordPress versiones anteriores a 1.2.4, usado por Findeo Theme, no garantizaba que la propiedad solicitada a eliminar perteneciera al usuario que realizaba la petición, lo que permitía a cualquier usuario autenticado eliminar propiedades arbitrarias alterando el parámetro property_id"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"contact@wpscan.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-425"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:purethemes:findeo:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.3.1","matchCriteriaId":"156BF978-930B-4D4E-8F98-11D87C6EB2AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:purethemes:realteo:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.2.4","matchCriteriaId":"8682C4CD-462D-4C38-BCAC-A463C9FA5E14"}]}]}],"references":[{"url":"https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt","source":"contact@wpscan.com"},{"url":"https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt","source":"contact@wpscan.com"},{"url":"https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5","source":"contact@wpscan.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/","source":"contact@wpscan.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Findeo-WordPress-Theme-v1.3.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://m0ze.ru/vulnerability/%5B2021-03-20%5D-%5BWordPress%5D-%5BCWE-284%5D-Realteo-WordPress-Plugin-v1.2.3.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://wpscan.com/vulnerability/b8434eb2-f522-484f-9227-5f581e7f48a5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.docs.purethemes.net/findeo/knowledge-base/changelog-findeo/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]}]}}]}