cvelist/2020/26xxx/CVE-2020-26596.json

67 lines
2.2 KiB
JSON
Raw Normal View History

2020-10-06 17:01:49 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2020-10-07 16:01:37 +00:00
"ID": "CVE-2020-26596",
"STATE": "PUBLIC"
2020-10-06 17:01:49 +00:00
},
2020-10-07 16:01:37 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2020-10-06 17:01:49 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2020-10-07 16:01:37 +00:00
"value": "The Dynamic OOO widget for the Elementor Pro plugin through 3.0.5 for WordPress allows remote authenticated users to execute arbitrary code because only the Editor role is needed to upload executable PHP code via the PHP Raw snippet. NOTE: this issue can be mitigated by removing the Dynamic OOO widget or by restricting availability of the Editor role."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://ww2.compunet.cl/dia-cero-en-plugin-de-wordpres-detectada-compunet-redteam/",
"url": "https://ww2.compunet.cl/dia-cero-en-plugin-de-wordpres-detectada-compunet-redteam/"
},
{
"refsource": "MISC",
"name": "https://elementor.com/pro/changelog/",
"url": "https://elementor.com/pro/changelog/"
2020-10-06 17:01:49 +00:00
}
]
}
}