5.3
CVE-2022-2133
- EPSS 0.25%
- Veröffentlicht 17.07.2022 11:15:08
- Zuletzt bearbeitet 21.11.2024 07:00:23
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
OAuth Single Sign On – SSO (OAuth Client) <= 6.22.5 - Authentication Bypass
The OAuth Single Sign On WordPress plugin before 6.22.6 doesn't validate that OAuth access token requests are legitimate, which allows attackers to log onto the site with the only knowledge of a user's email address.
Mögliche Gegenmaßnahme
OAuth Single Sign On – SSO (OAuth Client): Update to version 6.22.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
OAuth Single Sign On – SSO (OAuth Client)
Version
*-6.22.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Miniorange ≫ Oauth Single Sign On SwPlatformwordpress Version < 6.22.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.25% | 0.484 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:P/I:N/A:N
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.