CVE-2020-36666
CVSS V2 None
CVSS V3 None
Description
The directory-pro WordPress plugin before 1.9.5, final-user-wp-frontend-user-profiles WordPress plugin before 1.2.2, producer-retailer WordPress plugin through TODO, photographer-directory WordPress plugin before 1.0.9, real-estate-pro WordPress plugin before 1.7.1, institutions-directory WordPress plugin before 1.3.1, lawyer-directory WordPress plugin before 1.2.9, doctor-listing WordPress plugin before 1.3.6, Hotel Listing WordPress plugin before 1.3.7, fitness-trainer WordPress plugin before 1.4.1, wp-membership WordPress plugin before 1.5.7, sold by the same developer (e-plugins), do not implementing any security measures in some AJAX calls. For example in the file plugin.php, the function iv_directories_update_profile_setting() uses update_user_meta with any data provided by the ajax call, which can be used to give the logged in user admin capabilities. Since the plugins allow user registration via a custom form (even if the blog does not allow users to register) it makes any site using it vulnerable.
Overview
- CVE ID
- CVE-2020-36666
- Assigner
- contact@wpscan.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-27T16:15:07
- Last Modified Date
- 2023-04-03T16:06:22
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:e-plugins:directory_pro:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.9.5 | |
cpe:2.3:a:e-plugins:final_user:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.2.2 | |
cpe:2.3:a:e-plugins:fitness_trainer:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.4.1 | |
cpe:2.3:a:e-plugins:hospital_\&_doctor_directory:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.3.6 | |
cpe:2.3:a:e-plugins:hotel_directory:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.3.7 | |
cpe:2.3:a:e-plugins:institutions_directory:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.3.1 | |
cpe:2.3:a:e-plugins:lawyer_directory:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.2.9 | |
cpe:2.3:a:e-plugins:photographer-directory:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.0.9 | |
cpe:2.3:a:e-plugins:producer-retailer:-:*:*:*:*:wordpress:*:* | 1 | OR | ||
cpe:2.3:a:e-plugins:real_estate_pro:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.7.1 | |
cpe:2.3:a:e-plugins:wp_membership:*:*:*:*:*:wordpress:*:* | 1 | OR | 1.5.7 |
References
Reference URL | Reference Tags |
---|---|
https://codecanyon.net/user/e-plugins | Product |
https://wpscan.com/vulnerability/d079cb16-ead5-4bc8-b0b8-4a4dc2a54c96 | Exploit Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-36666 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36666 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:31:12 | Added to TrackCVE | |||
2023-04-17 03:31:15 | Weakness Enumeration | new |