8.8
CVE-2022-0499
- EPSS 0.12%
- Veröffentlicht 28.03.2022 18:15:09
- Zuletzt bearbeitet 21.11.2024 06:38:47
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Sermon Browser <= 0.45.22 - Cross-Site Request Forgery
The Sermon Browser WordPress plugin through 0.45.22 does not have CSRF checks in place when uploading Sermon files, and does not validate them in any way, allowing attackers to make a logged in admin upload arbitrary files such as PHP ones.
Mögliche Gegenmaßnahme
Sermon Browser: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Sermon Browser
Version
*-0.45.22
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sermon Browser Project ≫ Sermon Browser SwPlatformwordpress Version <= 0.45.22
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.12% | 0.317 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.