CVE-2024-1371
LeadConnector <= 1.7 - Missing Authorization to Unauthenticated Arbitrary Post Deletion
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
The LeadConnector plugin for WordPress is vulnerable to unauthorized modification & loss of data due to a missing capability check on the lc_public_api_proxy() function in all versions up to, and including, 1.7. This makes it possible for unauthenticated attackers to delete arbitrary posts. CVE-2024-34378 is likely a duplicate of this issue.
| CWE | CWE-862 |
| Vendor | varunvairavanlc |
| Product | leadconnector |
| Published | Apr 30, 2024 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for varunvairavanlc leadconnector
Be the first to know when new medium vulnerabilities affecting varunvairavanlc leadconnector are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
varunvairavanlc / LeadConnector
0 โค 1.7
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/79e786ce-a3eb-40df-8dad-4c9c75243bec?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/leadconnector/trunk/admin/class-lc-admin.php#L519 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3075667%40leadconnector&new=3075667%40leadconnector&sfp_email=&sfph_mail=
Credits
Krzysztof Zajฤ
c