CVE-2021-4374

Scores

EPSS

0.750medium75.0%
0%20%40%60%80%100%

Percentile: 75.0%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

The WordPress Automatic Plugin for WordPress is vulnerable to arbitrary options updates in versions up to, and including, 3.53.2. This is due to missing authorization and option validation in the process_form.php file. This makes it possible for unauthenticated attackers to arbitrarily update the settings of a vulnerable site and ultimately compromise the entire site.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-862

Exploits

Exploit ID: CVE-2021-4374

Source: github-poc

URL: https://github.com/Pranjal6955/CVE-2021-4374-Testing-Package

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: wordpress_automatic_plugin

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:valvepress:wordpress_automatic_plugin:*:*:*:*:*:wordpress:*:*",      "versionEndIncluding": "3.53.2",      "vulnerable": true    }  ],  "oper...

Source: nvd

End of list