9.8

CVE-2020-36708

Exploit

Epsilon Framework Themes (Various Versions) - Function Injection

The following themes for WordPress are vulnerable to Function Injections in versions up to and including Shapely <= 1.2.7, NewsMag <= 2.4.1, Activello <= 1.4.0, Illdy <= 2.1.4, Allegiant <= 1.2.2, Newspaper X <= 1.3.1, Pixova Lite <= 2.0.5, Brilliance <= 1.2.7, MedZone Lite <= 1.2.4, Regina Lite <= 2.0.4, Transcend <= 1.1.8, Affluent <= 1.1.0, Bonkers <= 1.0.4, Antreas <= 1.0.2, Sparkling <= 2.4.8, and NatureMag Lite <= 1.0.4. This is due to epsilon_framework_ajax_action. This makes it possible for unauthenticated attackers to call functions and achieve remote code execution.
Mögliche Gegenmaßnahme
Activello: Update to version 1.4.2, or a newer patched version
Affluent: Update to version 1.1.2, or a newer patched version
Allegiant: Update to version 1.2.6, or a newer patched version
Antreas: Update to version 1.0.7, or a newer patched version
Bonkers: Update to version 1.0.6, or a newer patched version
Brilliance: Update to version 1.3.0, or a newer patched version
Illdy: Update to version 2.1.7, or a newer patched version
MedZone Lite: Update to version 1.2.6, or a newer patched version
NatureMag Lite: Update to version 1.0.5, or a newer patched version
NewsMag: Update to version 2.4.2, or a newer patched version
Newspaper X: Update to version 1.3.2, or a newer patched version
Pixova Lite: Update to version 2.0.7, or a newer patched version
Regina Lite: Update to version 2.0.6, or a newer patched version
Shapely: Update to version 1.2.9, or a newer patched version
Sparkling: Update to version 2.4.9, or a newer patched version
Transcend: Update to version 1.2.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Theme
Produkt Activello
Version *-1.4.0
SystemWordPress Theme
Produkt Affluent
Version *-1.1.0
SystemWordPress Theme
Produkt Allegiant
Version *-1.2.2
SystemWordPress Theme
Produkt Antreas
Version *-1.0.2
SystemWordPress Theme
Produkt Bonkers
Version *-1.0.4
SystemWordPress Theme
Produkt Brilliance
Version *-1.2.7
SystemWordPress Theme
Produkt Illdy
Version *-2.1.4
SystemWordPress Theme
Produkt MedZone Lite
Version *-1.2.4
SystemWordPress Theme
Produkt NatureMag Lite
Version *-1.0.4
SystemWordPress Theme
Produkt NewsMag
Version *-2.4.1
SystemWordPress Theme
Produkt Newspaper X
Version *-1.3.1
SystemWordPress Theme
Produkt Pixova Lite
Version *-2.0.5
SystemWordPress Theme
Produkt Regina Lite
Version *-2.0.4
SystemWordPress Theme
Produkt Shapely
Version *-1.2.7
SystemWordPress Theme
Produkt Sparkling
Version *-2.4.8
SystemWordPress Theme
Produkt Transcend
Version *-1.1.8
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ColorlibActivello SwPlatformwordpress Version < 1.4.2
ColorlibBonkers SwPlatformwordpress Version < 1.0.6
ColorlibIlldy SwPlatformwordpress Version < 2.1.7
ColorlibNewspaper X SwPlatformwordpress Version < 1.3.2
ColorlibPixova Lite SwPlatformwordpress Version < 2.0.7
ColorlibShapely SwPlatformwordpress Version < 1.2.9
ColorlibSparklinkg SwPlatformwordpress Version <= 2.4.8
CpothemesAffluent SwPlatformwordpress Version < 1.1.2
CpothemesAllegiant SwPlatformwordpress Version < 1.2.6
CpothemesBrilliance SwPlatformwordpress Version < 1.3.0
CpothemesTranscend SwPlatformwordpress Version < 1.2.0
MachothemesAntreas SwPlatformwordpress Version < 1.0.7
MachothemesMedzone Lite SwPlatformwordpress Version < 1.2.6
MachothemesNaturemag Lite SwPlatformwordpress Version <= 1.0.4
MachothemesNewsmag SwPlatformwordpress Version < 2.4.2
MachothemesRegina Lite SwPlatformwordpress Version < 2.0.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 91.54% 0.997
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
security@wordfence.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.