6.5
CVE-2024-5149
- EPSS 0.17%
- Veröffentlicht 05.06.2024 05:15:50
- Zuletzt bearbeitet 21.11.2024 09:47:04
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
BuddyForms <= 2.8.9 - Email Verification Bypass due to Insufficient Randomness
The BuddyForms plugin for WordPress is vulnerable to Email Verification Bypass in all versions up to, and including, 2.8.9 via the use of an insufficiently random activation code. This makes it possible for unauthenticated attackers to bypass the email verification.
Mögliche Gegenmaßnahme
Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC): Update to version 2.8.10, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC)
Version
*-2.8.9
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Themekraft ≫ Buddyforms SwPlatformwordpress Version <= 2.8.9
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.17% | 0.384 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
| security@wordfence.com | 6.5 | 3.9 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
|
CWE-330 Use of Insufficiently Random Values
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.