8.8

CVE-2022-3911

Exploit

iubenda <= 3.3.2 - Authenticated (Subscriber+) Privilege Escalation

The iubenda WordPress plugin before 3.3.3 does does not have authorisation and CSRF in an AJAX action, and does not ensure that the options to be updated belong to the plugin as long as they are arrays. As a result, any authenticated users, such as subscriber can grant themselves any privileges, such as edit_plugins etc
Mögliche Gegenmaßnahme
iubenda | All-in-one Compliance for GDPR / CCPA Cookie Consent + more: Update to version 3.3.3, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt iubenda | All-in-one Compliance for GDPR / CCPA Cookie Consent + more
Version *-3.3.2
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
IubendaIubenda-cookie-law-solution SwPlatformwordpress Version < 3.3.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.21% 0.431
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

CWE-862 Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.