Description
The GetGenie plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.3.2 due to missing validation on a user controlled key in the `action` function. This makes it possible for authenticated attackers, with Author-level access and above, to update post metadata for arbitrary posts. Combined with a lack of input sanitization, this leads to Stored Cross-Site Scripting when a higher-privileged user (such as an Administrator) views the affected post's "Competitor" tab in the GetGenie sidebar.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
* (semver)
Timeline
| 2026-02-09: | Vendor Notified |
| 2026-03-12: | Disclosed |
Credits
Quốc Huy
References
www.wordfence.com/...-ec56-40cb-80ef-67585dadad77?source=cve
plugins.trac.wordpress.org/...e/tags/4.3.2/app/Api/Store.php
plugins.trac.wordpress.org/...e/tags/4.3.2/app/Api/Store.php
plugins.trac.wordpress.org/...%2Ftrunk&sfp_email=&sfph_mail=