Описание
In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection.
Ссылки
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.4.34.1 (исключая)
cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 38%
0.00168
Низкий
4.3 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-200
CWE-862
Связанные уязвимости
CVSS3: 4.3
github
больше 3 лет назад
In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection.
EPSS
Процентиль: 38%
0.00168
Низкий
4.3 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-200
CWE-862