7.5
CVE-2020-35234
- EPSS 75.66%
- Veröffentlicht 14.12.2020 03:15:13
- Zuletzt bearbeitet 21.11.2024 05:27:04
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Easy WP SMTP <= 1.4.2 - Sensitive Information Disclosure
The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there.
Mögliche Gegenmaßnahme
Easy WP SMTP – WordPress SMTP and Email Logs: Gmail, Office 365, Outlook, Custom SMTP, and more: Update to version 1.4.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Easy WP SMTP – WordPress SMTP and Email Logs: Gmail, Office 365, Outlook, Custom SMTP, and more
Version
*-1.4.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wp-ecommerce ≫ Easy Wp Smtp SwPlatformwordpress Version < 1.4.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 75.66% | 0.989 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-532 Insertion of Sensitive Information into Log File
The product writes sensitive information to a log file.