Логотип exploitDog
bind:CVE-2020-36713
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36713

Количество 2

Количество 2

nvd логотип

CVE-2020-36713

больше 2 лет назад

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-4w36-8q8w-r4jp

больше 2 лет назад

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36713

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.

CVSS3: 9.8
1%
Низкий
больше 2 лет назад
github логотип
GHSA-4w36-8q8w-r4jp

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.

CVSS3: 9.8
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу