Логотип exploitDog
bind:CVE-2023-6036
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-6036

Количество 3

Количество 3

nvd логотип

CVE-2023-6036

почти 2 года назад

The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions 'handle_auth_request' and 'hadle_login_request'. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-x79x-9c8r-88hj

почти 2 года назад

The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions 'handle_auth_request' and 'hadle_login_request'. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2024-01017

около 2 лет назад

Уязвимость функций handle_login_request() и handle_auth_request() плагина Web3 – Crypto wallet Login & NFT token gating системы управления содержимым сайта WordPress, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-6036

The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions 'handle_auth_request' and 'hadle_login_request'. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

CVSS3: 9.8
49%
Средний
почти 2 года назад
github логотип
GHSA-x79x-9c8r-88hj

The Web3 WordPress plugin before 3.0.0 is vulnerable to an authentication bypass due to incorrect authentication checking in the login flow in functions 'handle_auth_request' and 'hadle_login_request'. This makes it possible for non authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username.

CVSS3: 9.8
49%
Средний
почти 2 года назад
fstec логотип
BDU:2024-01017

Уязвимость функций handle_login_request() и handle_auth_request() плагина Web3 – Crypto wallet Login & NFT token gating системы управления содержимым сайта WordPress, позволяющая нарушителю обойти существующие ограничения безопасности

CVSS3: 8.8
49%
Средний
около 2 лет назад

Уязвимостей на страницу