4.3

CVE-2020-35934

Exploit

Advanced Access Manager <= 6.6.1 - Authenticated Information Disclosure

The Advanced Access Manager plugin before 6.6.2 for WordPress displays the unfiltered user object (including all metadata) upon login via the REST API (aam/v1/authenticate or aam/v2/authenticate). This is a security problem if this object stores information that the user is not supposed to have (e.g., custom metadata added by a different plugin).
Mögliche Gegenmaßnahme
Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More: Update to version 6.6.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Advanced Access Manager – Restricted Content, Users & Roles, Enhanced Security and More
Version * - 6.6.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VasyltechAdvanced Access Manager SwPlatformwordpress Version < 6.6.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.33% 0.552
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
nvd@nist.gov 4 8 2.9
AV:N/AC:L/Au:S/C:P/I:N/A:N
cve@mitre.org 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.