{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T05:38:59.507","vulnerabilities":[{"cve":{"id":"CVE-2024-8791","sourceIdentifier":"security@wordfence.com","published":"2024-09-24T03:15:03.547","lastModified":"2024-09-26T16:25:34.120","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Donation Forms by Charitable – Donations Plugin & Fundraising Platform for WordPress plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.8.1.14. This is due to the plugin not properly verifying a user's identity when the ID parameter is supplied through the update_core_user() function. This makes it possible for unauthenticated attackers to update the email address and password of arbitrary user accounts, including administrators, which can then be used to log in to those user accounts."},{"lang":"es","value":"El complemento Donation Forms de Charitable – Donations Plugin &amp; Fundraising Platform para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.8.1.14 incluida. Esto se debe a que el complemento no verifica correctamente la identidad de un usuario cuando se proporciona el parámetro ID a través de la función update_core_user(). Esto permite que atacantes no autenticados actualicen la dirección de correo electrónico y la contraseña de cuentas de usuario arbitrarias, incluidos los administradores, que luego se pueden usar para iniciar sesión en esas cuentas de usuario."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wpcharitable:charitable:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.8.1.15","matchCriteriaId":"439B094F-B8C8-4EFA-B250-D25F819E9357"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/charitable/tags/1.8.1.14/includes/users/class-charitable-user.php#L872","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3154009/charitable/trunk/includes/users/class-charitable-user.php","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/0ee60943-b583-4a99-8e62-846b380c98aa?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}