5.4
CVE-2023-38513
- EPSS 0.05%
- Veröffentlicht 20.12.2023 14:15:19
- Zuletzt bearbeitet 21.11.2024 08:13:44
- Quelle audit@patchstack.com
- CVE-Watchlists
- Unerledigt
Photo Engine <= 6.2.5 - Authenticated (Author+) Insecure Direct Object Reference in ajax_generate_auth_token
Authorization Bypass Through User-Controlled Key vulnerability in Jordy Meow Photo Engine (Media Organizer & Lightroom).This issue affects Photo Engine (Media Organizer & Lightroom): from n/a through 6.2.5.
Mögliche Gegenmaßnahme
Photo Engine (Media Organizer & Lightroom): Update to version 6.2.6, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Photo Engine (Media Organizer & Lightroom)
Version
* - 6.2.5
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Meowapps ≫ Photo Engine SwPlatformwordpress Version < 6.2.6
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.166 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
| audit@patchstack.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
CWE-639 Authorization Bypass Through User-Controlled Key
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.