Authorization Bypass Through User-Controlled Key vulnerability in Scott Taylor Avatar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Avatar: from n/a through 0.1.4.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 17 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Thu, 17 Apr 2025 15:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Authorization Bypass Through User-Controlled Key vulnerability in Scott Taylor Avatar allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Avatar: from n/a through 0.1.4. | |
| Title | WordPress Avatar plugin <= 0.1.4 - Insecure Direct Object References (IDOR) vulnerability | |
| Weaknesses | CWE-639 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Patchstack
Published: 2025-04-17T15:16:56.834Z
Updated: 2025-04-17T18:45:18.366Z
Reserved: 2025-04-16T06:23:15.163Z
Link: CVE-2025-39434
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-04-17T18:10:12.515Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-04-17T16:15:53.683
Modified: 2025-04-17T20:21:05.203
Link: CVE-2025-39434
 Redhat
                        Redhat
                    No data.