{ "id": "CVE-2020-24316", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-26T14:15:10.853", "lastModified": "2024-11-21T05:14:35.677", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WP Plugin Rednumber Admin Menu v1.1 and lower does not sanitize the value of the \"role\" GET parameter before echoing it back out to the user. This results in a reflected XSS vulnerability that attackers can exploit with a specially crafted URL." }, { "lang": "es", "value": "WP Plugin Rednumber Admin Menu versiones v1.1 e inferiores, no sanean el valor del par\u00e1metro GET \"role\" antes de devolverlo al usuario. Esto resulta en una vulnerabilidad de tipo XSS reflejado que los atacantes pueden explotar con una URL especialmente dise\u00f1ada" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "baseScore": 4.3, "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:admin_menu_project:admin_menu:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.1", "matchCriteriaId": "51094972-39FF-4F38-ADA2-75C6028AC95C" } ] } ] } ], "references": [ { "url": "https://wordpress.org/plugins/admin-menu/", "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ] }, { "url": "https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "URL Repurposed" ] }, { "url": "https://wordpress.org/plugins/admin-menu/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ] }, { "url": "https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "URL Repurposed" ] } ] }