CVE-2020-36731
🟡 Monitoruj
Brak autoryzacji w wtyczce Flexible Checkout Fields dla WooCommerce pozwala na nieautoryzowaną aktualizację ustawień.
CVSS
7.2
EPSS
19.5%
Exploit
poc
Vendor
wpdesk
Opis źródłowy (NVD)
The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.
exploit xss
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.2 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 19.5% |
| Opublikowano (NVD) | 2023-06-07 02:15:12 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:37 UTC |
Referencje
- https://blog.nintechnet.com/zero-day-vulnerability-fixed-in-wordpress-flexible-checkout-fields-for-woocommerce-plugin/ (security@wordfence.com) [Exploit]
- https://www.wordfence.com/blog/2020/02/site-takeover-campaign-exploits-multiple-zero-day-vulnerabilities/ (security@wordfence.com) [Exploit]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/fd12a952-2e99-41f7-b74c-55c2b7d8deed?source=cve (security@wordfence.com) [Third Party Advisory]