Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j4g8-8jw2-7ww9

Опубликовано: 11 сент. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The WooCommerce Photo Reviews Premium plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.3.13.2. This is due to the plugin not properly validating what user transient is being used in the login() function and not properly verifying the user's identity. This makes it possible for unauthenticated attackers to log in as user that has dismissed an admin notice in the past 30 days, which is often an administrator. Alternatively, a user can log in as any user with any transient that has a valid user_id as the value, though it would be more difficult to exploit this successfully.

The WooCommerce Photo Reviews Premium plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.3.13.2. This is due to the plugin not properly validating what user transient is being used in the login() function and not properly verifying the user's identity. This makes it possible for unauthenticated attackers to log in as user that has dismissed an admin notice in the past 30 days, which is often an administrator. Alternatively, a user can log in as any user with any transient that has a valid user_id as the value, though it would be more difficult to exploit this successfully.

EPSS

Процентиль: 98%
0.5214
Средний

9.8 Critical

CVSS3

Дефекты

CWE-288
CWE-306

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

The WooCommerce Photo Reviews Premium plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.3.13.2. This is due to the plugin not properly validating what user transient is being used in the login() function and not properly verifying the user's identity. This makes it possible for unauthenticated attackers to log in as user that has dismissed an admin notice in the past 30 days, which is often an administrator. Alternatively, a user can log in as any user with any transient that has a valid user_id as the value, though it would be more difficult to exploit this successfully.

EPSS

Процентиль: 98%
0.5214
Средний

9.8 Critical

CVSS3

Дефекты

CWE-288
CWE-306