CVE-2020-35947

An issue was discovered in the PageLayer plugin before 1.1.2 for WordPress. Nearly all of the AJAX action endpoints lacked permission checks, allowing these actions to be executed by anyone authenticated on the site. This happened because nonces were used as a means of authorization, but a nonce was present in a publicly viewable page. The greatest impact was the pagelayer_save_content function that allowed pages to be modified and allowed XSS to occur.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 05:28

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/10239 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/10239 - Exploit, Third Party Advisory
References () https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/ - Exploit, Patch, Third Party Advisory () https://www.wordfence.com/blog/2020/05/high-severity-vulnerabilities-in-pagelayer-plugin-affect-over-200000-wordpress-sites/ - Exploit, Patch, Third Party Advisory

Information

Published : 2021-01-01 04:15

Updated : 2024-11-21 05:28


NVD link : CVE-2020-35947

Mitre link : CVE-2020-35947

CVE.ORG link : CVE-2020-35947


JSON object : View

Products Affected

pagelayer

  • pagelayer
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')