8.8
CVE-2022-3911
- EPSS 0.21%
- Veröffentlicht 02.01.2023 22:15:15
- Zuletzt bearbeitet 10.04.2025 19:15:49
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
iubenda <= 3.3.2 - Authenticated (Subscriber+) Privilege Escalation
The iubenda WordPress plugin before 3.3.3 does does not have authorisation and CSRF in an AJAX action, and does not ensure that the options to be updated belong to the plugin as long as they are arrays. As a result, any authenticated users, such as subscriber can grant themselves any privileges, such as edit_plugins etc
Mögliche Gegenmaßnahme
iubenda | All-in-one Compliance for GDPR / CCPA Cookie Consent + more: Update to version 3.3.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
iubenda | All-in-one Compliance for GDPR / CCPA Cookie Consent + more
Version
*-3.3.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Iubenda ≫ Iubenda-cookie-law-solution SwPlatformwordpress Version < 3.3.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.21% | 0.431 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-352 Cross-Site Request Forgery (CSRF)
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.