Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3hqr-g258-rfxm

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In the AccessAlly WordPress plugin before 3.5.7, the file "resource/frontend/product/product-shortcode.php" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required.

In the AccessAlly WordPress plugin before 3.5.7, the file "resource/frontend/product/product-shortcode.php" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required.

EPSS

Процентиль: 96%
0.25403
Средний

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 7.5
nvd
почти 5 лет назад

In the AccessAlly WordPress plugin before 3.5.7, the file "resource/frontend/product/product-shortcode.php" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required.

EPSS

Процентиль: 96%
0.25403
Средний

Дефекты

CWE-200