5.4
CVE-2020-11516
- EPSS 0.34%
- Veröffentlicht 07.04.2020 17:15:14
- Zuletzt bearbeitet 21.11.2024 04:58:03
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Contact Form 7 Datepicker <= 2.6.0 - Authenticated Stored Cross-Site Scripting
Stored XSS in the Contact Form 7 Datepicker plugin through 2.6.0 for WordPress allows authenticated attackers with minimal permissions to save arbitrary JavaScript to the plugin's settings via the unprotected wp_ajax_cf7dp_save_settings AJAX action and the ui_theme parameter. If an administrator creates or modifies a contact form, the JavaScript will be executed in their browser, which can then be used to create new administrative users or perform other actions using the administrator's session.
Mögliche Gegenmaßnahme
Contact Form 7 Datepicker: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Contact Form 7 Datepicker
Version
*-2.6.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Contact-form-7-datepicker Project ≫ Contact-form-7-datepicker SwPlatformwordpress Version <= 2.6.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.34% | 0.563 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
| nvd@nist.gov | 3.5 | 6.8 | 2.9 |
AV:N/AC:M/Au:S/C:N/I:P/A:N
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.