CVE-2020-36708
🔴 Łataj teraz
Wtyczki WordPressa są podatne na wstrzyknięcia funkcji, co umożliwia zdalne wykonanie kodu.
CVSS
9.8
EPSS
90.0%
Exploit
poc
Vendor
colorlib
Opis źródłowy (NVD)
The following themes for WordPress are vulnerable to Function Injections in versions up to and including Shapely <= 1.2.7, NewsMag <= 2.4.1, Activello <= 1.4.0, Illdy <= 2.1.4, Allegiant <= 1.2.2, Newspaper X <= 1.3.1, Pixova Lite <= 2.0.5, Brilliance <= 1.2.7, MedZone Lite <= 1.2.4, Regina Lite <= 2.0.4, Transcend <= 1.1.8, Affluent <= 1.1.0, Bonkers <= 1.0.4, Antreas <= 1.0.2, Sparkling <= 2.4.8, and NatureMag Lite <= 1.0.4. This is due to epsilon_framework_ajax_action. This makes it possible for unauthenticated attackers to call functions and achieve remote code execution.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 90.0% |
| Opublikowano (NVD) | 2023-06-07 02:15:11 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 18:17:08 UTC |
Referencje
- https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-fixed-in-15-wordpress-themes/ (security@wordfence.com) [Exploit, Third Party Advisory]
- https://blog.nintechnet.com/unauthenticated-function-injection-vulnerability-in-wordpress-sparkling-theme/ (security@wordfence.com) [Exploit, Third Party Advisory]
- https://wpscan.com/vulnerability/bec52a5b-c892-4763-a962-05da7100eca5 (security@wordfence.com) [Third Party Advisory]
- https://www.wordfence.com/blog/2020/11/large-scale-attacks-target-epsilon-framework-themes/ (security@wordfence.com) [Third Party Advisory]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/5b75c322-539d-44e9-8f26-5ff929874b67?source=cve (security@wordfence.com) [Third Party Advisory]