Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rjxr-p6mg-hvgf

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).

The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).

EPSS

Процентиль: 99%
0.80007
Высокий

Дефекты

CWE-863

Связанные уязвимости

CVSS3: 7.5
nvd
больше 5 лет назад

The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).

EPSS

Процентиль: 99%
0.80007
Высокий

Дефекты

CWE-863