4.3
CVE-2022-40130
- EPSS 0.19%
- Veröffentlicht 18.11.2022 23:15:20
- Zuletzt bearbeitet 20.02.2025 20:15:39
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
WP-Polls <= 2.76.0 - Race Condition
Auth. (subscriber+) Race Condition vulnerability in WP-Polls plugin <= 2.76.0 on WordPress.
Mögliche Gegenmaßnahme
WP-Polls: Update to version 2.77.0, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
WP-Polls
Version
*-2.76.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Wp-polls Project ≫ Wp-polls SwPlatformwordpress Version < 2.77.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.19% | 0.412 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 3.1 | 1.6 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
|
| audit@patchstack.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
|
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.