5.3
CVE-2023-3219
- EPSS 74.71%
- Veröffentlicht 10.07.2023 16:15:55
- Zuletzt bearbeitet 21.11.2024 08:16:43
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
EventON <= 2.1 - Insecure Direct Object Reference to Unauthorized Post Access
The EventON WordPress plugin before 2.1.2 does not validate that the event_id parameter in its eventon_ics_download ajax action is a valid Event, allowing unauthenticated visitors to access any Post (including unpublished or protected posts) content via the ics export functionality by providing the numeric id of the post.
Mögliche Gegenmaßnahme
EventON (Pro) - WordPress Virtual Event Calendar Plugin: Update to version 4.4, or a newer patched version
EventON – Events Calendar: Update to version 2.1.2, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
EventON (Pro) - WordPress Virtual Event Calendar Plugin
Version
[*, 4.4)
SystemWordPress Plugin
≫
Produkt
EventON – Events Calendar
Version
*-2.1
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 74.71% | 0.988 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.