High severity7.1NVD Advisory· Published Dec 14, 2022· Updated Apr 8, 2026
CVE-2022-4501
CVE-2022-4501
Description
The Mega Addons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the vc_saving_data function in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to update the plugin's settings.
Affected products
1- cpe:2.3:a:topdigitaltrends:mega_addons_for_wpbakery_page_builder:*:*:*:*:*:wordpress:*:*Range: <=4.2.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- plugins.trac.wordpress.org/browser/mega-addons-for-visual-composer/tags/4.2.7/main.phpnvdPatchThird Party Advisory
- www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-9748-5359efd51754nvdThird Party Advisory
- www.wordfence.com/threat-intel/vulnerabilities/id/a1eda885-7e10-4294-9748-5359efd51754nvd
News mentions
0No linked articles in our index yet.