CVE-2020-10195

The popup-builder plugin before 3.64.1 for WordPress allows information disclosure and settings modification, leading to in-scope privilege escalation via admin-post actions to com/classes/Actions.php. By sending a POST request to wp-admin/admin-post.php, an authenticated attacker with minimal (subscriber-level) permissions can modify the plugin's settings to allow arbitrary roles (including subscribers) access to plugin functionality by setting the action parameter to sgpbSaveSettings, export a list of current newsletter subscribers by setting the action parameter to csv_file, or obtain system configuration information including webserver configuration and a list of installed plugins by setting the action parameter to sgpb_system_info.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sygnoos:popup-builder:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 04:54

Type Values Removed Values Added
References () https://wpvulndb.com/vulnerabilities/10127 - Third Party Advisory () https://wpvulndb.com/vulnerabilities/10127 - Third Party Advisory
References () https://www.wordfence.com/blog/2020/03/vulnerabilities-patched-in-popup-builder-plugin-affecting-over-100000-sites/ - Exploit, Third Party Advisory () https://www.wordfence.com/blog/2020/03/vulnerabilities-patched-in-popup-builder-plugin-affecting-over-100000-sites/ - Exploit, Third Party Advisory

Information

Published : 2020-03-13 16:15

Updated : 2024-11-21 04:54


NVD link : CVE-2020-10195

Mitre link : CVE-2020-10195

CVE.ORG link : CVE-2020-10195


JSON object : View

Products Affected

sygnoos

  • popup-builder
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor