Search criteria
2 vulnerabilities found for GP Unique ID by Gravity Wiz
CVE-2024-0710 (GCVE-0-2024-0710)
Vulnerability from nvd – Published: 2024-05-02 16:57 – Updated: 2024-08-01 18:11
VLAI?
Summary
The GP Unique ID plugin for WordPress is vulnerable to Unique ID Modification in all versions up to, and including, 1.5.5. This is due to insufficient input validation. This makes it possible for unauthenticated attackers to tamper with the generation of a unique ID on a form submission and replace the generated unique ID with a user-controlled one, leading to a loss of integrity in cases where the ID's uniqueness is relied upon in a security-specific context.
Severity ?
5.3 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Gravity Wiz | GP Unique ID |
Affected:
* , ≤ 1.5.5
(semver)
|
Credits
Karl Emil Nikka
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:gravity_wiz:gp_unique_id:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gp_unique_id",
"vendor": "gravity_wiz",
"versions": [
{
"status": "affected",
"version": "1.5.5"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0710",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-02T17:52:46.260705Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:58:53.597Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:11:35.724Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26db2d25-01b8-49c5-a4d6-284780ac97bb?source=cve"
},
{
"tags": [
"x_transferred"
],
"url": "https://gravitywiz.com/documentation/gravity-forms-unique-id/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/karlemilnikka/CVE-2024-0710/blob/main/README.md"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "GP Unique ID",
"vendor": "Gravity Wiz",
"versions": [
{
"lessThanOrEqual": "1.5.5",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Karl Emil Nikka"
}
],
"descriptions": [
{
"lang": "en",
"value": "The GP Unique ID plugin for WordPress is vulnerable to Unique ID Modification in all versions up to, and including, 1.5.5. This is due to insufficient input validation. This makes it possible for unauthenticated attackers to tamper with the generation of a unique ID on a form submission and replace the generated unique ID with a user-controlled one, leading to a loss of integrity in cases where the ID\u0027s uniqueness is relied upon in a security-specific context."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-20 Improper Input Validation",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-02T16:57:15.807Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26db2d25-01b8-49c5-a4d6-284780ac97bb?source=cve"
},
{
"url": "https://gravitywiz.com/documentation/gravity-forms-unique-id/"
},
{
"url": "https://github.com/karlemilnikka/CVE-2024-0710/blob/main/README.md"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-01-13T00:00:00.000Z",
"value": "Vendor Notified"
},
{
"lang": "en",
"time": "2024-04-10T00:00:00.000Z",
"value": "Disclosed"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2024-0710",
"datePublished": "2024-05-02T16:57:15.807Z",
"dateReserved": "2024-01-18T23:54:43.419Z",
"dateUpdated": "2024-08-01T18:11:35.724Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-0710 (GCVE-0-2024-0710)
Vulnerability from cvelistv5 – Published: 2024-05-02 16:57 – Updated: 2024-08-01 18:11
VLAI?
Summary
The GP Unique ID plugin for WordPress is vulnerable to Unique ID Modification in all versions up to, and including, 1.5.5. This is due to insufficient input validation. This makes it possible for unauthenticated attackers to tamper with the generation of a unique ID on a form submission and replace the generated unique ID with a user-controlled one, leading to a loss of integrity in cases where the ID's uniqueness is relied upon in a security-specific context.
Severity ?
5.3 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Gravity Wiz | GP Unique ID |
Affected:
* , ≤ 1.5.5
(semver)
|
Credits
Karl Emil Nikka
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:gravity_wiz:gp_unique_id:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "gp_unique_id",
"vendor": "gravity_wiz",
"versions": [
{
"status": "affected",
"version": "1.5.5"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-0710",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-02T17:52:46.260705Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:58:53.597Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T18:11:35.724Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26db2d25-01b8-49c5-a4d6-284780ac97bb?source=cve"
},
{
"tags": [
"x_transferred"
],
"url": "https://gravitywiz.com/documentation/gravity-forms-unique-id/"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/karlemilnikka/CVE-2024-0710/blob/main/README.md"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "GP Unique ID",
"vendor": "Gravity Wiz",
"versions": [
{
"lessThanOrEqual": "1.5.5",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Karl Emil Nikka"
}
],
"descriptions": [
{
"lang": "en",
"value": "The GP Unique ID plugin for WordPress is vulnerable to Unique ID Modification in all versions up to, and including, 1.5.5. This is due to insufficient input validation. This makes it possible for unauthenticated attackers to tamper with the generation of a unique ID on a form submission and replace the generated unique ID with a user-controlled one, leading to a loss of integrity in cases where the ID\u0027s uniqueness is relied upon in a security-specific context."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-20 Improper Input Validation",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-02T16:57:15.807Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26db2d25-01b8-49c5-a4d6-284780ac97bb?source=cve"
},
{
"url": "https://gravitywiz.com/documentation/gravity-forms-unique-id/"
},
{
"url": "https://github.com/karlemilnikka/CVE-2024-0710/blob/main/README.md"
}
],
"timeline": [
{
"lang": "en",
"time": "2024-01-13T00:00:00.000Z",
"value": "Vendor Notified"
},
{
"lang": "en",
"time": "2024-04-10T00:00:00.000Z",
"value": "Disclosed"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2024-0710",
"datePublished": "2024-05-02T16:57:15.807Z",
"dateReserved": "2024-01-18T23:54:43.419Z",
"dateUpdated": "2024-08-01T18:11:35.724Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}