6.9
CVE-2026-1789
- EPSS 0.06%
- Veröffentlicht 24.04.2026 00:16:26
- Zuletzt bearbeitet 24.04.2026 14:39:56
- Quelle f98c90f0-e9bd-4fa7-911b-51993f
- CVE-Watchlists
- Unerledigt
WordPress Campaign Monitor for WordPress plugin <= 2.9.1 - Broken Access Control vulnerability
A vulnerability in the browser-based remote management interface may allow an administrator to access sensitive information on the device via crafted requests, affecting certain production printers and office/small office multifunction printers.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCanon Inc.
≫
Produkt
imagePRESS Series
Version
all version
Status
affected
HerstellerCanon Inc.
≫
Produkt
imageFORCE Series
Version
all version
Status
affected
HerstellerCanon Inc.
≫
Produkt
imageRUNNER ADVANCE Series
Version
all version
Status
affected
HerstellerCanon Inc.
≫
Produkt
imageRUNNER Series
Version
all version
Status
affected
HerstellerCanon Inc.
≫
Produkt
Satera MF7525F
Version
v15.00 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
Satera MF7625F
Version
v8.12 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
Satera MF7725F
Version
v16.04 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
Satera MF842CDW
Version
v16.04 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
imageCLASS X C1538iF II
Version
v16.04 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
imageCLASS X MF1538C II
Version
v16.04 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
i-SENSYS C1533iF II
Version
v16.04 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
i-SENSYS X C1538 iF II
Version
v16.04 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
i-SENSYS MF842Cdw
Version
v16.04 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
MF842CDW
Version
v16.04 or earlier
Status
affected
HerstellerCanon Inc.
≫
Produkt
MF842CX
Version
v16.04 or earlier
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.189 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| f98c90f0-e9bd-4fa7-911b-51993f3571fd | 6.9 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
| f98c90f0-e9bd-4fa7-911b-51993f3571fd | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
|
CWE-807 Reliance on Untrusted Inputs in a Security Decision
The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.