High severity8.1NVD Advisory· Published May 29, 2024· Updated Apr 8, 2026
CVE-2024-4611
CVE-2024-4611
Description
The AppPresser plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'decrypt_value' and on the 'doCookieAuth' functions in all versions up to, and including, 4.3.2. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they previously used the login via the plugin API. This can only be exploited if the 'openssl' php extension is not loaded on the server.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/changeset/3093975/apppressernvdPatch
- www.wordfence.com/threat-intel/vulnerabilities/id/d1498fdf-9d5e-4277-92be-469d6646864bnvdThird Party Advisory
- plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.phpnvdProduct
- plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_Theme_Switcher.phpnvdProduct
- plugins.trac.wordpress.org/browser/apppresser/trunk/inc/AppPresser_User.phpnvdProduct
News mentions
0No linked articles in our index yet.