cvelist/2023/0xxx/CVE-2023-0505.json

89 lines
2.9 KiB
JSON
Raw Normal View History

2023-01-26 21:07:25 +00:00
{
2023-03-27 16:00:36 +00:00
"data_version": "4.0",
2023-01-26 21:07:25 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0505",
2023-03-27 16:00:36 +00:00
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
2023-01-26 21:07:25 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-03-27 16:00:36 +00:00
"value": "The Ever Compare WordPress plugin through 1.2.3 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "Ever Compare",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "affected",
"versionType": "custom",
"version": "0",
"lessThanOrEqual": "1.2.3"
}
],
"defaultStatus": "affected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/dbabff3e-b021-49ed-aaf3-b73a77d4b354",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/dbabff3e-b021-49ed-aaf3-b73a77d4b354"
2023-01-26 21:07:25 +00:00
}
]
2023-03-27 16:00:36 +00:00
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Lana Codes"
},
{
"lang": "en",
"value": "WPScan"
}
]
2023-01-26 21:07:25 +00:00
}