The uListing plugin for WordPress is vulnerable to authorization bypass via Ajax due to missing capability checks, missing input validation, and a missing security nonce in the stm_update_email_data AJAX action in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to change any WordPress option in the database.
History

Wed, 08 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
Title uListing <= 1.6.6 - Unauthenticated Wordpress Options Changes via AJAX

Sat, 28 Dec 2024 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2023-06-07T01:51:13.114Z

Updated: 2026-04-08T16:37:34.352Z

Reserved: 2023-06-06T12:29:12.757Z

Link: CVE-2021-4341

cve-icon Vulnrichment

Updated: 2024-08-03T17:23:10.628Z

cve-icon NVD

Status : Modified

Published: 2023-06-07T02:15:13.127

Modified: 2026-04-08T17:16:38.757

Link: CVE-2021-4341

cve-icon Redhat

No data.