[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f1z9Ai2TBAIwiWRWiQ6qGJdOhvpagJUu9zegafTYJ9F4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-12402","themes-coder-create-android-ios-apps-for-your-woocommerce-site-insecure-direct-object-reference-to-password-changeaccoun","Themes Coder – Create Android & iOS Apps For Your Woocommerce Site \u003C= 1.3.4 - Insecure Direct Object Reference to Password Change\u002FAccount Takeover\u002FPrivilege Escalation","The Themes Coder – Create Android & iOS Apps For Your Woocommerce Site plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.3.4. This is due to the plugin not properly validating a user's identity prior to updating their password through the update_user_profile() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.","tc-ecommerce",null,"\u003C=1.3.4","1.4.0","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Authentication Bypass Using an Alternate Path or Channel","2025-01-06 15:09:57","2025-07-24 19:03:58",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F1ec14b1e-6d1a-4451-9fce-ac064623d92f?source=api-prod",199]