6.5
CVE-2022-1663
- EPSS 0.22%
- Veröffentlicht 29.08.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:41:12
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Stop Spam Comments <= 0.2.1.2 - Protection Mechanism Bypass
The Stop Spam Comments WordPress plugin through 0.2.1.2 does not properly generate the Javascript access token for preventing abuse of comment section, allowing threat authors to easily collect the value and add it to the request.
Mögliche Gegenmaßnahme
Stop Spam Comments: No known patch available. Please review the vulnerability's details in depth and employ mitigations based on your organization's risk tolerance. It may be best to uninstall the affected software and find a replacement.
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Stop Spam Comments
Version
*-0.2.1.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Stop Spam Comments Project ≫ Stop Spam Comments SwPlatformwordpress Version <= 0.2.1.2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.22% | 0.44 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 3.9 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.