9.8
CVE-2021-25032
- EPSS 81.89%
- Veröffentlicht 10.01.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 05:54:13
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
PublishPress Capabilities <= 2.3 - Unauthenticated Arbitrary Options Update
The PublishPress Capabilities WordPress plugin before 2.3.1, PublishPress Capabilities Pro WordPress plugin before 2.3.1 does not have authorisation and CSRF checks when updating the plugin's settings via the init hook, and does not ensure that the options to be updated belong to the plugin. As a result, unauthenticated attackers could update arbitrary blog options, such as the default role and make any new registered user with an administrator role.
Mögliche Gegenmaßnahme
PublishPress Capabilities – User Role Editor, Access Permissions, User Capabilities, Admin Menus: Update to version 2.3.1, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
PublishPress Capabilities – User Role Editor, Access Permissions, User Capabilities, Admin Menus
Version
[*, 2.3.1)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Publishpress ≫ Capabilities SwEdition- SwPlatformwordpress Version < 2.3.1
Publishpress ≫ Capabilities SwEditionpro SwPlatformwordpress Version < 2.3.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 81.89% | 0.992 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.