Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-75vj-36gh-8x22

Опубликовано: 07 июн. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The Wordable plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.1. This is due to the use of a user supplied hashing algorithm passed to the hash_hmac() function and the use of a loose comparison on the hash which allows an attacker to trick the function into thinking it has a valid hash. This makes it possible for unauthenticated attackers to gain administrator privileges.

The Wordable plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.1. This is due to the use of a user supplied hashing algorithm passed to the hash_hmac() function and the use of a loose comparison on the hash which allows an attacker to trick the function into thinking it has a valid hash. This makes it possible for unauthenticated attackers to gain administrator privileges.

EPSS

Процентиль: 34%
0.00141
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-288
CWE-306

Связанные уязвимости

CVSS3: 9.8
nvd
больше 2 лет назад

The Wordable plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.1. This is due to the use of a user supplied hashing algorithm passed to the hash_hmac() function and the use of a loose comparison on the hash which allows an attacker to trick the function into thinking it has a valid hash. This makes it possible for unauthenticated attackers to gain administrator privileges.

EPSS

Процентиль: 34%
0.00141
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-288
CWE-306