Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v5h4-982g-572v

Опубликовано: 31 мая 2023
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.

The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.

EPSS

Процентиль: 28%
0.00099
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-345

Связанные уязвимости

CVSS3: 9.8
nvd
больше 2 лет назад

The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.

EPSS

Процентиль: 28%
0.00099
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-345