[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$ftEC8vn5MyHOdfU2LPIYGP15GGFW_nj6eyNyJwXyyO0A":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-9637","school-management-system-wpschoolpress-insecure-direct-object-reference-to-authenticated-teacher-account-takeoverprivile","School Management System – WPSchoolPress \u003C= 2.2.10 - Insecure Direct Object Reference to Authenticated (Teacher+) Account Takeover\u002FPrivilege Escalation","The School Management System – WPSchoolPress plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.10. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with teacher-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.","wpschoolpress",null,"\u003C=2.2.10","2.2.11","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Authorization Bypass Through User-Controlled Key","2024-10-25 20:05:13","2024-10-30 17:35:19",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F411693fc-9df3-44b1-9a6f-58a6e8ef23b8?source=api-prod",5]