CVE-2020-36724
🔴 Łataj teraz
Obejście uwierzytelnienia w wtyczce Wordable dla WordPressa umożliwia uzyskanie uprawnień administratora.
CVSS
9.8
EPSS
0.2%
Exploit
poc
Vendor
wordable
Opis źródłowy (NVD)
The Wordable plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.1. This is due to the use of a user supplied hashing algorithm passed to the hash_hmac() function and the use of a loose comparison on the hash which allows an attacker to trick the function into thinking it has a valid hash. This makes it possible for unauthenticated attackers to gain administrator privileges.
auth-bypass exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.2% |
| Opublikowano (NVD) | 2023-06-07 02:15:12 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:35 UTC |
Referencje
- https://blog.nintechnet.com/wordpress-plugins-and-themes-vulnerabilities-roundup/ (security@wordfence.com) [Exploit]
- https://plugins.trac.wordpress.org/changeset/2234193/wordable/trunk/wordable.php (security@wordfence.com) [Patch]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/be1ab218-37bd-407a-8cb9-66f761849c21?source=cve (security@wordfence.com) [Third Party Advisory]