cvelist/2022/4xxx/CVE-2022-4693.json
2023-01-23 15:00:43 +00:00

84 lines
2.6 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2022-4693",
"ASSIGNER": "contact@wpscan.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "The User Verification WordPress plugin before 1.0.94 was affected by an Auth Bypass security vulnerability. To bypass authentication, we only need to know the user\u2019s username. Depending on whose username we know, which can be easily queried because it is usually public data, we may even be given an administrative role on the website."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287 Improper Authentication"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Unknown",
"product": {
"product_data": [
{
"product_name": "User Verification",
"version": {
"version_data": [
{
"version_value": "0",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea",
"refsource": "MISC",
"name": "https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea"
},
{
"url": "https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957",
"refsource": "MISC",
"name": "https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957"
}
]
},
"generator": {
"engine": "WPScan CVE Generator"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Lana Codes"
},
{
"lang": "en",
"value": "WPScan"
}
]
}