5.3
CVE-2019-13344
- EPSS 60.77%
- Veröffentlicht 05.07.2019 16:15:11
- Zuletzt bearbeitet 21.11.2024 04:24:45
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
WP Like Button <= 1.6.0 - Missing Authorization
An authentication bypass vulnerability in the CRUDLab WP Like Button plugin through 1.6.0 for WordPress allows unauthenticated attackers to change settings. The contains() function in wp_like_button.php did not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update settings, as demonstrated by the wp-admin/admin.php?page=facebook-like-button each_page_url or code_snippet parameter.
Mögliche Gegenmaßnahme
WP Like Button: Update to version 1.6.1, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP Like Button
Version
[*, 1.6.1)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Crudlab ≫ Wp Like Button SwPlatformwordpress Version <= 1.6.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 60.77% | 0.982 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.