{"api_version":"1","generated_at":"2026-04-10T06:29:22+00:00","cve":"CVE-2024-3729","urls":{"html":"https://cve.report/CVE-2024-3729","api":"https://cve.report/api/cve/CVE-2024-3729.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-3729","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-3729"},"summary":{"title":"Frontend Admin by DynamiApps <= 3.19.4 - Improper Missing Encryption Exception Handling to Form Manipulation","description":"The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to improper missing encryption exception handling  on the 'fea_encrypt' function in all versions up to, and including, 3.19.4. This makes it possible for unauthenticated attackers to manipulate the user processing forms, which can be used to add and edit administrator user for privilege escalation, or to automatically log in users for authentication bypass, or manipulate the post processing form that can be used to inject arbitrary web scripts. This can only be exploited if the 'openssl' php extension is not loaded on the server.","state":"PUBLISHED","assigner":"Wordfence","published_at":"2024-05-02 17:15:30","updated_at":"2026-04-08 19:21:26"},"problem_types":["CWE-636","CWE-754","CWE-636 CWE-636 Not Failing Securely ('Failing Open')"],"metrics":[{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/acf-frontend-form-element/tags/3.18.15/main/helpers.php#L617","name":"https://plugins.trac.wordpress.org/browser/acf-frontend-form-element/tags/3.18.15/main/helpers.php#L617","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/a2d22c5d-5ef5-4920-a1b5-e8284394c7e8?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/a2d22c5d-5ef5-4920-a1b5-e8284394c7e8?source=cve","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://plugins.trac.wordpress.org/changeset/3073379/acf-frontend-form-element#file4","name":"https://plugins.trac.wordpress.org/changeset/3073379/acf-frontend-form-element#file4","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-3729","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-3729","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"shabti","product":"Frontend Admin by DynamiApps","version":"affected 3.19.4 semver","platforms":[]},{"source":"ADP","vendor":"wordpress","product":"frontend_admin_by_dynamiapps","version":"affected - 3.19.4 custom","platforms":[]}],"timeline":[{"source":"CNA","time":"2024-04-12T00:00:00.000Z","lang":"en","value":"Discovered"},{"source":"CNA","time":"2024-04-12T00:00:00.000Z","lang":"en","value":"Vendor Notified"},{"source":"CNA","time":"2024-04-18T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"István Márton","lang":"en"}],"nvd_cpes":[{"cve_year":"2024","cve_id":"3729","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dynamiapps","cpe5":"frontend_admin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2024","cve_id":"3729","cve":"CVE-2024-3729","epss":"0.005510000","percentile":"0.680100000","score_date":"2026-04-09","updated_at":"2026-04-10 00:07:02"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"affected":[{"cpes":["cpe:2.3:a:wordpress:frontend_admin_by_dynamiapps:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","product":"frontend_admin_by_dynamiapps","vendor":"wordpress","versions":[{"lessThanOrEqual":"3.19.4","status":"affected","version":"-","versionType":"custom"}]}],"metrics":[{"other":{"content":{"id":"CVE-2024-3729","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-05-02T18:06:09.524216Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-06-04T17:31:26.995Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2024-08-01T20:20:01.048Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/a2d22c5d-5ef5-4920-a1b5-e8284394c7e8?source=cve"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/browser/acf-frontend-form-element/tags/3.18.15/main/helpers.php#L617"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset/3073379/acf-frontend-form-element#file4"}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Frontend Admin by DynamiApps","vendor":"shabti","versions":[{"lessThanOrEqual":"3.19.4","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"István Márton"}],"descriptions":[{"lang":"en","value":"The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to improper missing encryption exception handling  on the 'fea_encrypt' function in all versions up to, and including, 3.19.4. This makes it possible for unauthenticated attackers to manipulate the user processing forms, which can be used to add and edit administrator user for privilege escalation, or to automatically log in users for authentication bypass, or manipulate the post processing form that can be used to inject arbitrary web scripts. This can only be exploited if the 'openssl' php extension is not loaded on the server."}],"metrics":[{"cvssV3_1":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-636","description":"CWE-636 Not Failing Securely ('Failing Open')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T17:12:43.147Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/a2d22c5d-5ef5-4920-a1b5-e8284394c7e8?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/acf-frontend-form-element/tags/3.18.15/main/helpers.php#L617"},{"url":"https://plugins.trac.wordpress.org/changeset/3073379/acf-frontend-form-element#file4"}],"timeline":[{"lang":"en","time":"2024-04-12T00:00:00.000Z","value":"Discovered"},{"lang":"en","time":"2024-04-12T00:00:00.000Z","value":"Vendor Notified"},{"lang":"en","time":"2024-04-18T00:00:00.000Z","value":"Disclosed"}],"title":"Frontend Admin by DynamiApps <= 3.19.4 - Improper Missing Encryption Exception Handling to Form Manipulation"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2024-3729","datePublished":"2024-05-02T16:52:28.332Z","dateReserved":"2024-04-12T18:15:54.930Z","dateUpdated":"2026-04-08T17:12:43.147Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-05-02 17:15:30","lastModifiedDate":"2026-04-08 19:21:26","problem_types":["CWE-636","CWE-754","CWE-636 CWE-636 Not Failing Securely ('Failing Open')"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dynamiapps:frontend_admin:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"3.19.5","matchCriteriaId":"49450E76-F658-432B-9C4F-C71CE765FFCF"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"3729","Ordinal":"1","Title":"Frontend Admin by DynamiApps <= 3.19.4 - Improper Missing Encryp","CVE":"CVE-2024-3729","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"3729","Ordinal":"1","NoteData":"The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to improper missing encryption exception handling  on the 'fea_encrypt' function in all versions up to, and including, 3.19.4. This makes it possible for unauthenticated attackers to manipulate the user processing forms, which can be used to add and edit administrator user for privilege escalation, or to automatically log in users for authentication bypass, or manipulate the post processing form that can be used to inject arbitrary web scripts. This can only be exploited if the 'openssl' php extension is not loaded on the server.","Type":"Description","Title":"Frontend Admin by DynamiApps <= 3.19.4 - Improper Missing Encryp"}]}}}