9.8

CVE-2021-4362

Exploit

Kiwi Social Sharing 2.1.0 - 2.1.2 - Arbitrary Options Change

The Kiwi Social Share plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the kiwi_social_share_get_option() function called via the kiwi_social_share_get_option AJAX action in version 2.1.0. This makes it possible for unauthenticated attackers to read and modify arbitrary options on a WordPress site that can be used for complete site takeover. This was a previously fixed vulnerability that was reintroduced in this version.
Mögliche Gegenmaßnahme
Social Sharing Plugin – Kiwi: Update to version 2.1.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Social Sharing Plugin – Kiwi
Version 2.1.0 - 2.1.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
WpkubeKiwi Social Share Version2.1.0 SwPlatformwordpress
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.7% 0.713
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
security@wordfence.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.