9.8

CVE-2021-25032

Exploit

PublishPress Capabilities <= 2.3 - Unauthenticated Arbitrary Options Update

The PublishPress Capabilities WordPress plugin before 2.3.1, PublishPress Capabilities Pro WordPress plugin before 2.3.1 does not have authorisation and CSRF checks when updating the plugin's settings via the init hook, and does not ensure that the options to be updated belong to the plugin. As a result, unauthenticated attackers could update arbitrary blog options, such as the default role and make any new registered user with an administrator role.
Mögliche Gegenmaßnahme
PublishPress Capabilities – User Role Editor, Access Permissions, User Capabilities, Admin Menus: Update to version 2.3.1, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt PublishPress Capabilities – User Role Editor, Access Permissions, User Capabilities, Admin Menus
Version [*, 2.3.1)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PublishpressCapabilities SwEdition- SwPlatformwordpress Version < 2.3.1
PublishpressCapabilities SwEditionpro SwPlatformwordpress Version < 2.3.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 81.89% 0.992
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.