2023-01-26 21:07:25 +00:00
{
2023-03-27 16:00:36 +00:00
"data_version" : "4.0" ,
2023-01-26 21:07:25 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"CVE_data_meta" : {
"ID" : "CVE-2023-0505" ,
2023-03-27 16:00:36 +00:00
"ASSIGNER" : "contact@wpscan.com" ,
"STATE" : "PUBLIC"
2023-01-26 21:07:25 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2023-03-27 16:00:36 +00:00
"value" : "The Ever Compare WordPress plugin through 1.2.3 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack"
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-352 Cross-Site Request Forgery (CSRF)"
}
]
}
]
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Unknown" ,
"product" : {
"product_data" : [
{
"product_name" : "Ever Compare" ,
"version" : {
"version_data" : [
{
"version_value" : "not down converted" ,
"x_cve_json_5_version_data" : {
"versions" : [
{
"status" : "affected" ,
"versionType" : "custom" ,
"version" : "0" ,
"lessThanOrEqual" : "1.2.3"
}
] ,
"defaultStatus" : "affected"
}
}
]
}
}
]
}
}
]
}
} ,
"references" : {
"reference_data" : [
{
"url" : "https://wpscan.com/vulnerability/dbabff3e-b021-49ed-aaf3-b73a77d4b354" ,
"refsource" : "MISC" ,
"name" : "https://wpscan.com/vulnerability/dbabff3e-b021-49ed-aaf3-b73a77d4b354"
2023-01-26 21:07:25 +00:00
}
]
2023-03-27 16:00:36 +00:00
} ,
"generator" : {
"engine" : "WPScan CVE Generator"
} ,
"source" : {
"discovery" : "EXTERNAL"
} ,
"credits" : [
{
"lang" : "en" ,
"value" : "Lana Codes"
} ,
{
"lang" : "en" ,
"value" : "WPScan"
}
]
2023-01-26 21:07:25 +00:00
}