{ "id": "CVE-2022-4693", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-23T15:15:16.190", "lastModified": "2024-11-21T07:35:44.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The User Verification WordPress plugin before 1.0.94 was affected by an Auth Bypass security vulnerability. To bypass authentication, we only need to know the user\u2019s username. Depending on whose username we know, which can be easily queried because it is usually public data, we may even be given an administrative role on the website." }, { "lang": "es", "value": "El complemento User Verification de WordPress anterior a la versi\u00f3n 1.0.94 se vio afectado por una vulnerabilidad de seguridad de Auth Bypass. Para evitar la autenticaci\u00f3n, s\u00f3lo necesitamos saber el nombre de usuario del usuario. Dependiendo de qu\u00e9 nombre de usuario conozcamos, que se puede consultar f\u00e1cilmente porque normalmente son datos p\u00fablicos, es posible que incluso se nos asigne una funci\u00f3n administrativa en el sitio web." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-522" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:pickplugins:user_verification:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.0.94", "matchCriteriaId": "9AABDFAF-A75B-438D-AA4C-E1C2DA0D6745" } ] } ] } ], "references": [ { "url": "https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957", "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea", "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://lana.codes/lanavdb/eeabe1d3-6f64-400a-8fb2-0865efdf6957", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] }, { "url": "https://wpscan.com/vulnerability/1eee10a8-135f-4b76-8289-c381ff1f51ea", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ] } ] }