8.8
CVE-2020-35932
- EPSS 0.98%
- Veröffentlicht 01.01.2021 02:15:13
- Zuletzt bearbeitet 21.11.2024 05:28:32
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Newsletter <= 6.8.1 - Authenticated PHP Object Injection
Insecure Deserialization in the Newsletter plugin before 6.8.2 for WordPress allows authenticated remote attackers with minimal privileges (such as subscribers) to use the tpnc_render AJAX action to inject arbitrary PHP objects via the options[inline_edits] parameter. NOTE: exploitability depends on PHP objects that might be present with certain other plugins or themes.
Mögliche Gegenmaßnahme
Newsletter – Send awesome emails from WordPress: Update to version 6.8.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Newsletter – Send awesome emails from WordPress
Version
[*, 6.8.2)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tribulant ≫ Newsletter SwPlatformwordpress Version < 6.8.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.98% | 0.763 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6 | 6.8 | 6.4 |
AV:N/AC:M/Au:S/C:P/I:P/A:P
|
| cve@mitre.org | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.