3.5
CVE-2022-0279
- EPSS 0.17%
- Veröffentlicht 21.02.2022 11:15:09
- Zuletzt bearbeitet 21.11.2024 06:38:17
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
AnyComment <= 0.2.17 - Race Condition
The AnyComment WordPress plugin before 0.2.18 is affected by a race condition when liking/disliking a comment/reply, which could allow any authenticated user to quickly raise their rating or lower the rating of other users
Mögliche Gegenmaßnahme
AnyComment: Update to version 0.2.18, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
AnyComment
Version
[*, 0.2.18)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Bologer ≫ Anycomment SwPlatformwordpress Version < 0.2.18
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.17% | 0.39 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 3.1 | 1.6 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
|
| nvd@nist.gov | 3.5 | 6.8 | 2.9 |
AV:N/AC:M/Au:S/C:N/I:P/A:N
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.