Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m9j8-w3jp-p7wq

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there.

The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there.

EPSS

Процентиль: 99%
0.77656
Высокий

Дефекты

CWE-532

Связанные уязвимости

CVSS3: 7.5
nvd
около 5 лет назад

The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there.

EPSS

Процентиль: 99%
0.77656
Высокий

Дефекты

CWE-532