CVE-2020-36728
⚪ Do wiadomości
Luka w wtyczce Adning Advertising dla WordPressa pozwala na usunięcie plików przez atakujących.
CVSS
6.5
EPSS
84.4%
Exploit
poc
Vendor
tunasite
Opis źródłowy (NVD)
The Adning Advertising plugin for WordPress is vulnerable to file deletion via path traversal in versions up to, and including, 1.5.5. This allows unauthenticated attackers to delete arbitrary files which can be used to reset and gain full control of a site.
exploit path-traversal
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 6.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 84.4% |
| Opublikowano (NVD) | 2023-06-07 13:15:09 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:36 UTC |
Referencje
- https://blog.nintechnet.com/critical-vulnerability-in-adning-advertising-plugin-actively-exploited-in-the-wild/ (security@wordfence.com) [Third Party Advisory]
- https://codecanyon.net/item/wp-pro-advertising-system-all-in-one-ad-manager/269693 (security@wordfence.com) [Product]
- https://www.wordfence.com/blog/2020/07/critical-vulnerabilities-patched-in-adning-advertising-plugin/ (security@wordfence.com) [Exploit, Third Party Advisory]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/e7506429-7f8a-45b5-b1b0-6fdb39599ee5?source=cve (security@wordfence.com) [Third Party Advisory]