2023-11-30 17:00:22 +00:00
{
"id" : "CVE-2023-37890" ,
"sourceIdentifier" : "audit@patchstack.com" ,
"published" : "2023-11-30T16:15:09.267" ,
2023-12-06 00:55:21 +00:00
"lastModified" : "2023-12-06T00:40:24.507" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-11-30 17:00:22 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Missing Authorization vulnerability in WPOmnia KB Support \u2013 WordPress Help Desk and Knowledge Base allows Accessing Functionality Not Properly Constrained by ACLs.\u00a0Users with a role as low as a subscriber can view other customers.This issue affects KB Support \u2013 WordPress Help Desk and Knowledge Base: from n/a through 1.5.88.\n\n"
2023-12-06 00:55:21 +00:00
} ,
{
"lang" : "es" ,
"value" : "Vulnerabilidad de autorizaci\u00f3n faltante en WPOmnia KB Support \u2013 WordPress Help Desk and Knowledge Base permite Accessing Functionality Not Properly Constrained by ACLs. Los usuarios con un rol tan bajo como suscriptor pueden ver a otros clientes. Este problema afecta a KB Support \u2013 WordPress Help Desk and Knowledge Base: desde n/a hasta 1.5.88."
2023-11-30 17:00:22 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-12-06 00:55:21 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
} ,
2023-11-30 17:00:22 +00:00
{
"source" : "audit@patchstack.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
}
]
} ,
"weaknesses" : [
2023-12-06 00:55:21 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-862"
}
]
} ,
2023-11-30 17:00:22 +00:00
{
"source" : "audit@patchstack.com" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-862"
}
]
}
] ,
2023-12-06 00:55:21 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:liquidweb:kb_support:*:*:*:*:*:wordpress:*:*" ,
"versionEndIncluding" : "1.5.88" ,
"matchCriteriaId" : "2F497D28-37E4-46DA-A55D-A1C21F137B60"
}
]
}
]
}
] ,
2023-11-30 17:00:22 +00:00
"references" : [
{
"url" : "https://patchstack.com/database/vulnerability/kb-support/wordpress-kb-support-wordpress-help-desk-plugin-1-5-88-sensitive-data-exposure-vulnerability?_s_id=cve" ,
2023-12-06 00:55:21 +00:00
"source" : "audit@patchstack.com" ,
"tags" : [
"Third Party Advisory"
]
2023-11-30 17:00:22 +00:00
}
]
}